Refine your search

Your search returned 184 results.

|
1.
OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H387 2008.
2.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
3.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M31845 2010.
4.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
5.
Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .W56 2011.
6.
The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 A5453 2011.
7.
Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
8.
PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.R345 2003eb.
9.
Cyber Smart : Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals.

by McDonough, Bart R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .M336 2019.
10.
Rewired : Cybersecurity Governance.

by Ellis, Ryan | Mohan, Vivek.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Somerset : John Wiley & Sons, Incorporated, 2019Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .R495 2019.
11.
Transformational Security Awareness : What Neuroscientists, Storytellers, and Marketers Can Teach Us about Driving Secure Behaviors.

by Carpenter, Perry.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C377 2019.
12.
The Cybersecurity Playbook : How Every Leader and Employee Can Contribute to a Culture of Security.

by Cerra, Allison.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C477 2019.
13.
Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach.

by Parkinson, Simon | Crampton, Andrew | Hill, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
14.
Official (ISC)2® Guide to the ISSAP® CBK, Second Edition.

by Corporate, (ISC)².

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Philadelphia, PA : CRC Press, 2017Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 -- .O34 2014.
15.
Online banking security measures and data protection / Shadi A. Aljawarneh, editor.

by Aljawarneh, Shadi [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HG1708.7 .O55 2017.
16.
Network Security Metrics.

by Wang, Lingyu | Jajodia, Sushil | Singhal, Anoop.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
17.
Information Security : Design, Implementation, Measurement, and Compliance.

by Layton, Timothy P.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 -- .L393 2007.
18.
Data Mining Tools for Malware Detection.

by Masud, Mehedy | Khan, Latifur | Thuraisingham, Bhavani.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D343 -- M385 2012.
19.
CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits.

by Tiller, James S.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- T56 2012.
20.
Security and Policy Driven Computing.

by Liu, Lei.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Baton Rouge : CRC Press, 2016Copyright date: ©2010Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- L587 2011.