Refine your search

Your search returned 636 results.

|
21.
ISO22301 : 2019 - an introduction to a business continuity management system (BCMS).

by Calder, Alan, 1957-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [S.l.] : ITGP, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD61.
22.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
23.
Mastering Web Services Security.

by Hartman, Bret | Flinn, Donald J | Beznosov, Konstantin.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.M375 2003eb.
24.
Advanced Computing and Systems for Security : Volume Eight.

by Chaki, Rituparna | Cortesi, Agostino | Saeed, Khalid | Chaki, Nabendu.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore Pte. Limited, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
25.
Dirty Tricks in the Digital Age [electronic resource].

by Kamarck, Elaine C | West, Darrell M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington, DC : Brookings Institution Press, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: JK1967.
26.
How Cyber Security Can Protect Your Business [electronic resource] : A Guide for All Stakeholders.

by Wright, Christopher.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
27.
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies.

by Gritzalis, Dimitris | Theocharidou, Marianthi | Stergiopoulos, George.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
28.
Reinforcement Learning for Cyber-Physical Systems : With Cybersecurity Case Studies.

by Li, Chong | Qiu, Meikang.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press LLC, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q325.6 .L5 2019.
29.
Cyber Smart : Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals.

by McDonough, Bart R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .M336 2019.
30.
Cybersecurity in Nigeria : A Case Study of Surveillance and Prevention of Digital Crime.

by Iorliam, Aamo.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
31.
Cybersecurity Blue Team Toolkit.

by Tanner, Nadean H.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .T366 2019.
32.
Rewired : Cybersecurity Governance.

by Ellis, Ryan | Mohan, Vivek.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Somerset : John Wiley & Sons, Incorporated, 2019Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .R495 2019.
33.
Transformational Security Awareness : What Neuroscientists, Storytellers, and Marketers Can Teach Us about Driving Secure Behaviors.

by Carpenter, Perry.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C377 2019.
34.
CEH V10 Certified Ethical Hacker Study Guide.

by Messier, Ric.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .M477 2019.
35.
The Digital Big Bang : The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity.

by Quade, Phil.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .Q334 2019.
36.
The Cybersecurity Playbook : How Every Leader and Employee Can Contribute to a Culture of Security.

by Cerra, Allison.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C477 2019.
37.
Anomaly Detection Principles and Algorithms.

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
38.
Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach.

by Parkinson, Simon | Crampton, Andrew | Hill, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
39.
Network Intrusion Detection Using Deep Learning : A Feature Learning Approach.

by Kim, Kwangjo | Aminanto, Muhamad Erza | Tanuwidjaja, Harry Chandra.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
40.
Advanced Computing and Systems for Security : Volume Seven.

by Chaki, Rituparna | Cortesi, Agostino | Saeed, Khalid | Chaki, Nabendu.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore Pte. Limited, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.