Refine your search

Your search returned 298 results.

|
1.
OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H387 2008.
2.
Securing Citrix XenApp Server in the Enterprise.

by Azad, Tariq.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.C55S369 2008.
3.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
4.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M31845 2010.
5.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
6.
Cyber Attacks : Protecting National Infrastructure

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.2 .A47 2011.
7.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625.
8.
Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25W548 2011.
9.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
10.
Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .W56 2011.
11.
The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 A5453 2011.
12.
Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
13.
Low Tech Hacking : Street Smarts for Security Professionals

by Wiles, Jack | Gudaitis, Terry | Jabbusch, Jennifer | Rogers, Russ | Lowther, Sean.

Material type: Text Text; Format: electronic regular print Publisher: St. Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5102.85.
14.
PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.R345 2003eb.
15.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
16.
Mastering Web Services Security.

by Hartman, Bret | Flinn, Donald J | Beznosov, Konstantin.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.M375 2003eb.
17.
Advanced Computing and Systems for Security : Volume Eight.

by Chaki, Rituparna | Cortesi, Agostino | Saeed, Khalid | Chaki, Nabendu.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore Pte. Limited, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
18.
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies.

by Gritzalis, Dimitris | Theocharidou, Marianthi | Stergiopoulos, George.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
19.
Reinforcement Learning for Cyber-Physical Systems : With Cybersecurity Case Studies.

by Li, Chong | Qiu, Meikang.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press LLC, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: Q325.6 .L5 2019.
20.
Cyber Smart : Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals.

by McDonough, Bart R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .M336 2019.