Refine your search

Your search returned 636 results.

|
41.
Digital Forensics and Investigations : People, Process, and Technologies to Defend the Enterprise.

by Sachowski, Jason.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : Taylor & Francis Group, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 .S23 2018.
42.
World Internet Development Report 2017 : Translated by Peng Ping.

by Chinese Academy of Cyberspace Studies, Chinese Academy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin, Heidelberg : Springer, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
43.
Security for Software Engineers.

by Helfrich, James N.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press LLC, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .H454 2019.
44.
Hardware Security : A Hands-On Learning Approach.

by Bhunia, Swarup | Tehranipoor, Mark.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science & Technology, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .B486 2019.
45.
Cybersecurity Best Practices : Lösungen Zur Erhöhung der Cyberresilienz Für Unternehmen und Behörden.

by Bartsch, Michael | Frey, Stefanie.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Wiesbaden : Springer Fachmedien Wiesbaden GmbH, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
46.
Windows Security Monitoring : Scenarios and Patterns.

by Miroshnikov, Andrei.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.W56 .M576 2018.
47.
CompTIA Security+ Practice Tests : Exam SY0-501.

by Easttom, Chuck | Christy, S. Russell.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C475 2018.
48.
Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA.

by Ahram, Tareq Z | Nicholson, Denise.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
49.
Versatile Cybersecurity.

by Conti, Mauro | Somani, Gaurav | Poovendran, Radha.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
50.
Solving Cyber Risk : Protecting Your Company and Society.

by Coburn, Andrew | Leverett, Eireann | Woo, Gordon.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C638 2019.
51.
Official (ISC)2® Guide to the ISSAP® CBK, Second Edition.

by Corporate, (ISC)².

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Philadelphia, PA : CRC Press, 2017Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 -- .O34 2014.
52.
Cybersecurity in France.

by Baumard, Philippe.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
53.
Predictive Computing and Information Security.

by Gupta, P. K | Tyagi, Vipin | Singh, S. K.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q335.G878 2017.
54.
Security in the digital world : for the home user, parent, consumer and home office / Graham Day.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [S.l.] : IT GOVERNANCE LTD, 2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
55.
Securing the Internet of Things.

by Li, Shancang | Xu, Li Da.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : Elsevier Science, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.L5 2017.
56.
Security solutions for hyperconnectivity and the Internet of things / Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors.

by Dawson, Maurice, 1982- [editor.] | Eltayeb, Mohamed, 1978- [editor.] | Omar, Marwan, 1982- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.15.C97 S43 2017.
57.
Online banking security measures and data protection / Shadi A. Aljawarneh, editor.

by Aljawarneh, Shadi [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HG1708.7 .O55 2017.
58.
Implementing Cybersecurity : A Guide to the National Institute of Standards and Technology Risk Management Framework.

by Kohnke, Anne | Sigler, Ken | Shoemaker, Dan.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.K646 2017.
59.
Compilation for Secure Multi-Party Computation.

by Büscher, Niklas | Katzenbeisser, Stefan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25QA76.9.D35.
60.
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption.

by Holden, Joshua.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Princeton : Princeton University Press, 2017Copyright date: ©2017Online access: Click here to view book Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA268 .H653 2019.