Refine your search

Your search returned 636 results.

|
61.
Network Security Metrics.

by Wang, Lingyu | Jajodia, Sushil | Singhal, Anoop.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
62.
Advanced Penetration Testing : Hacking the World's Most Secure Networks.

by Allsopp, Wil.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.A457 2017.
63.
Hacking the Hacker : Learn from the Experts Who Take down Hackers.

by Grimes, Roger A.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
64.
DNS Security Management.

by Dooley, Michael | Rooney, Timothy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2017Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.D665 2017.
65.
Data Analytics and Decision Support for Cybersecurity : Trends, Methodologies and Applications.

by Palomares Carrascosa, Iván | Kalutarage, Harsha Kumara | Huang, Yan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
66.
Differential Privacy and Applications.

by Zhu, Tianqing | Li, Gang | Zhou, Wanlei | Yu, Philip S.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
67.
The Hardware Trojan War : Attacks, Myths, and Defenses.

by Bhunia, Swarup | Tehranipoor, Mark M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
68.
Improving information security practices through computational intelligence / Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors.

by Awad, Wasan Shaker, 1969- [editor.] | El-Alfy, El Sayed M, 1968- [editor.] | Al-Bastaki, Yousif A. Latif [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q342 .I46 2016.
69.
National security and counterintelligence in the era of cyber espionage / Eugenie de Silva, editor.

by Silva, Eugenie de [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: JF1525.I6 N38 2016.
70.
Handbook of research on modern cryptographic solutions for computer and cyber security / Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.

by Gupta, Brij, 1982- [editor.] | Agrawal, Dharma P. (Dharma Prakash), 1945- [editor.] | Yamaguchi, Shingo, 1969- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H364 2016.
71.
Innovative solutions for access control management / Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors.

by Malik, Ahmad Kamran, 1973- [editor.] | Anjum, Adeel, 1982- [editor.] | Raza, Basit, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I57 2016.
72.
Combating security breaches and criminal activity in the digital sphere / S. Geetha and Asnath Victy Phamila, editors.

by Geetha, S, 1979- [editor.] | Phamila, Asnath Victy, 1978- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .C6495 2016.
73.
Honeypots application in Internet threats detection / presented by Tomáš Sochor.

by Sochor, Tomáš [speaker.] | IGI Global [production company.].

Material type: Film Film; Format: available online remote; Type of visual material: motion picture Other title: Internet threat detection using honeypots..Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.875.I57 S635 2016.
74.
The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin.

by Zinatullin, Leron [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 Z56 2016.
75.
Selling information security to the board : a primer.

by Calder, Alan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [Place of publication not identified] : It Governance Pub, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 .C35 2016.
76.
Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder.

by Calder, Alan, 1957- [author.].

Edition: Third edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .C352 2016.
77.
PCI DSS : a pocket guide / Alan Calder, Geraint Williams.

by Calder, Alan | Williams, Geraint.

Edition: 5th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 C35 2016.
78.
Nuevos retos para la protección de datos personales : en la Era del Big Data y de la computación ubicua / Ana Garriga Domínguez.

by Garriga Domínguez, Ana.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Madrid : Dykinson, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .G241 2016.
79.
Information Security : Design, Implementation, Measurement, and Compliance.

by Layton, Timothy P.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 -- .L393 2007.
80.
Complete Guide to CISM Certification.

by Peltier, Thomas R | Peltier, Justin.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.3 -- .P43 2006.