Refine your search

Your search returned 636 results.

|
181.
Usable Security : History, Themes, and Challenges

by Garfinkel, Simson | Lipford, Heather Richter.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
182.
Critical Infrastructure Protection in Homeland Security : Defending a Networked Nation

by Lewis, Ted G.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 L5 2014.
183.
Cybercrime : Investigating High-Technology Computer Crime

by Moore, Robert.

Edition: 2Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 M66 2014.
184.
Cyber Blockades.

by Russell, Alison Lawlor.

Material type: Text Text; Format: electronic available online remote Publisher: Washington : Georgetown University Press, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.15.C97.
185.
A Practical Guide to Security Engineering and Information Assurance.

by Herrmann, Debra S.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H47 2002eb.
186.
Hardware Security : Design, Threats, and Safeguards

by Mukhopadhyay, Debdeep | Chakraborty, Rajat Subhra.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .M384 2014.
187.
Architecting User-Centric Privacy-as-a-Set-of-Services : Digital Identity-Related Privacy Framework

by Ayed, Ghazi Ben.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .A384 2014.
188.
Dependability Problems of Complex Information Systems.

by Zamojski, Wojciech | Sugier, Jarosław.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q342.
189.
Computational Network Science : An Algorithmic Approach

by Hexmoor, Henry.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
190.
Cyber Reconnaissance, Surveillance and Defense.

by Shimonski, Robert.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK7882.E2 S56 2014.
191.
Technology and the Law on the Use of Force : New Security Challenges in the Twenty-First Century

by Maogoto, Jackson.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: KZ6718 .M34 2014.
192.
Computer Security.

by Hsiao, David K | Kerr, Douglas S | Madnick, Stuart E | Ashenhurst, Robert L.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 G65 2014.
193.
Safety of Computer Control Systems 1990 (SAFECOMP'90) : Proceedings of the IFAC/EWICS/SARS Symposium Gatwick, UK, 30 October - 2 November 1990

by Daniels, B.K.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TJ212.2 .S239 2014.
194.
Ultimate Computer Security Survey.

by Schaub, James L | Biery, Ken D.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .S35 2014.
195.
Bolt from the Blue : How Companies Can Handle the Unexpected, from Government Regulation to Cyber Crime

by Pullen, Mike | Donald, John Brodie.

Material type: Text Text; Format: electronic available online remote Publisher: Chicago : Elliott & Thompson, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
196.
Computers, Business, and Security : The New Role for Security

by Schweitzer, James A.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S355 2014.
197.
Physically Unclonable Functions (PUFs) : Applications, Models, and Future Directions

by Wachsmann, Christian | Sadeghi, Ahmad-Reza.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W384 2014.
198.
Information Security Management Handbook, Fourth Edition, Volume II.

by Tipton, Harold F.

Edition: 4th ed.Material type: Text Text; Format: electronic available online remote Publisher: : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
199.
Management of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: TK5105.59 .W5356 2014.
200.
Dictionary of Information Security.

by Slade, Robert.

Material type: Text Text; Format: electronic available online remote Publisher: Rockland : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S53 2006eb.