Refine your search

Your search returned 31 results.

|
1.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
2.
The Hardware Trojan War : Attacks, Myths, and Defenses.

by Bhunia, Swarup | Tehranipoor, Mark M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
3.
Official (ISC)2 Guide to the CSSLP.

by Paul, Mano.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.D47 -- P3775 2011.
4.
Secure and Resilient Software Development.

by Merkow, Mark S | Raghavan, Lakshmikanth.

Material type: Text Text; Format: electronic available online remote Publisher: London : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.D47 -- M466 2010eb.
5.
Agile Risk Management.

by Moran, Alan.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.751.
6.
Usable Security : History, Themes, and Challenges

by Garfinkel, Simson | Lipford, Heather Richter.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
7.
Hardware Security : Design, Threats, and Safeguards

by Mukhopadhyay, Debdeep | Chakraborty, Rajat Subhra.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .M384 2014.
8.
Technology and the Law on the Use of Force : New Security Challenges in the Twenty-First Century

by Maogoto, Jackson.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: KZ6718 .M34 2014.
9.
Managed Code Rootkits : Hooking into Runtime Environments.

by Metula, Erez.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M487 2010.
10.
Detecting Peripheral-Based Attacks on the Host Memory.

by Stewin, Patrick.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2014Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK1-9971TK7887.5TK78.
11.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory.

by Hale Ligh, Michael | Case, Andrew | Levy, Jamie | Walters, Aaron.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25L54 2014.
12.
Pro ASP.NET Web API Security : Securing ASP.NET Web API

by Lakshmiraghavan, Badrinarayanan.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.A63 .L384 2013.
13.
Android Malware.

by Jiang, Xuxian | Zhou, Yajin.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.C68.
14.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Syngress, an imprint of Elsevier, 2013Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 E5443 2013eb.
15.
Hardware Malware.

by Krieg, Christian | Dabrowski, Adrian.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
16.
Security Basics for Computer Architects.

by Lee, Ruby B.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .S384 2013.
17.
Pro ASP.NET Web API : HTTP Web Services in ASP.NET

by Uurlu, Ali | Zeitler, Alexander | Kheyrollahi, Ali.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.A63.
18.
Developing and evaluating security-aware software systems / Khaled M. Khan, editor.

by Khan, Khaled M, 1959- | IGI Global.

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .D48 2013.
19.
Rapid acquisition and fielding for information assurance and cyber security in the Navy / Isaac R. Porche III, Shawn McKay, Megan McKernan, Robert W. Button, Bob Murphy, Kate Giglio, Elliot Axelband.

by Porche, Isaac, 1968- [author.] | McKay, Shawn [author.] | McKernan, Megan [author.] | Button, Robert [author.] | Giglio, Kate [author.] | National Defense Research Institute (U.S.) | Rand Corporation.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Santa Monica, CA : RAND Corporation, 2012Copyright date: ©2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: VB212 .P67 2012.
20.
Security-aware systems applications and software development methods / Khaled M. Khan, editor.

by Khan, Khaled M, 1959- | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .S43924 2012.