Your search returned 14 results.

|
1.
Managing information security / edited by John R. Vacca.

by Vacca, John R.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam ; Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
2.
The basics of IT audit : purposes, processes, and practical information / Stephen D. Gantz.

by Gantz, Stephen D.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: T58.5 .G37 2013.
3.
Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner.

by Broad, James | Bindner, Andrew.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .B384 2013.
4.
Malware forensic field guide for Linux systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina ; edited by Rob Maxwell.

by Malin, Cameron H [author.] | Aquilina, James M [author.] | Casey, Eoghan [author.] | Rose, Curtis W [editor of compilation.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
5.
Intelligent systems for security informatics / Christopher C. Yang ... [et al.].

by Yang, Christopher C.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 I58 2013.
6.
Windows server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows server 2012 security solutions / Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder.

by Shinder, Thomas W | Diogenes, Yuri | Shinder, Debra Littlejohn.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Elsevier, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.774.M434 S55 2013eb.
7.
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 C627 2013eb.
8.
Risk management framework : a lab-based approach to securing information systems / James Broad.

by Broad, James.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 B72 2013eb.
9.
FISMA compliance handbook / Laura P. Taylor.

by Taylor, Laura P.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: KF4850 .A3282002.
10.
Information protection playbook / edited by Greg Kane, Lorna Koppel.

by Kane, Greg [editor of compilation.] | Koppel, Lorna [editor of compilation.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kidlington, Oxford : Elsevier, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
11.
Linux Malware Incident Response : an Excerpt from Malware Forensic Field Guide for Linux Systems.

by Malin, Cameron H | Casey, Eoghan | Aquilina, James M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.3 .M384 2013.
12.
The basics of web hacking : tools and techniques to attack the Web / Josh Pauli.

by Pauli, Joshua J.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .P385 2013eb.
13.
Cisco PIX firewalls : configure, manage, & troubleshoot / Thorsten Behrens ... [et al.] ; Charles Riley, technical editor ; Umer Khan, technical reviewer.

by Behrens, Thorsten | Riley, Charles | Khan, Umer.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .C57 2005eb.
14.
Securing IM and P2P Applications for the Enterprise.

by Sachs, Marcus H | Ebooks Corporation.

Material type: Text Text; Literary form: Not fiction Publisher: Rockland : Syngress Publishing, 2005Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.