Refine your search

Your search returned 606 results.

|
1.
OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H387 2008.
2.
Securing Citrix XenApp Server in the Enterprise.

by Azad, Tariq.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.C55S369 2008.
3.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
4.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M31845 2010.
5.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
6.
Cyber Attacks : Protecting National Infrastructure

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.2 .A47 2011.
7.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625.
8.
Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25W548 2011.
9.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
10.
Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .W56 2011.
11.
The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 A5453 2011.
12.
Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
13.
Low Tech Hacking : Street Smarts for Security Professionals

by Wiles, Jack | Gudaitis, Terry | Jabbusch, Jennifer | Rogers, Russ | Lowther, Sean.

Material type: Text Text; Format: electronic regular print Publisher: St. Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5102.85.
14.
PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.R345 2003eb.
15.
The Internet in Everything [electronic resource] : Freedom and Security in a World with No off Switch.

by DeNardis, Laura.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New Haven : Yale University Press, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HM851.
16.
ISO/IEC 27701.

by Shipman, Alan | Watkins, Steve.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
17.
Futureproof : security aesthetics and the management of life / edited by D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein.

by Ghertner, D. Asher [editor.] | McFann, Hudson, 1987- [editor.] | Goldstein, Daniel M, 1965- [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Durham : Duke University Press, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: JC571 .F887 2020.
18.
Cyber Security : Essential principles to secure your organisation / Calder, Alan.

by Calder, Alan [author.] | Safari, an O'Reilly Media Company.

Edition: 1st edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: IT Governance Publishing, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
19.
Securing Cloud Services : A Pragmatic Approach, Second Edition.

by Newcombe, Lee.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .N49 2020.
20.
Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.).

by Jasper, Scott [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington, DC : Georgetown University Press, [2020]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: U167.5.C92 J375 2020.