Refine your search

Your search returned 57 results.

|
1.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
2.
Innovative solutions for access control management / Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors.

by Malik, Ahmad Kamran, 1973- [editor.] | Anjum, Adeel, 1982- [editor.] | Raza, Basit, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I57 2016.
3.
Group Policy : Fundamentals, Security, and the Managed Desktop

by Moskowitz, Jeremy.

Edition: 3rd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.77.
4.
The State of the Art in Intrusion Prevention and Detection.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S7354.
5.
Malware forensic field guide for Linux systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina ; edited by Rob Maxwell.

by Malin, Cameron H [author.] | Aquilina, James M [author.] | Casey, Eoghan [author.] | Rose, Curtis W [editor of compilation.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
6.
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense

by Watson, Gavin | Mason, Andrew | Ackroyd, Richard.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W38 2014.
7.
Safety of Computer Control Systems 1990 (SAFECOMP'90) : Proceedings of the IFAC/EWICS/SARS Symposium Gatwick, UK, 30 October - 2 November 1990

by Daniels, B.K.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TJ212.2 .S239 2014.
8.
Snort Intrusion Detection and Prevention Toolkit.

by Caswell, Brian | Beale, Jay | Baker, Andrew.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
9.
InfoSecurity 2008 Threat Analysis.

by Schiller, Craig | Fogie, Seth | DeRodeff, Colby | Gregg, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I565 2008.
10.
Managed Code Rootkits : Hooking into Runtime Environments.

by Metula, Erez.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M487 2010.
11.
Safety of Computer Control Systems 1990 (SAFECOMP'90) : Proceedings of the IFAC/EWICS/SARS Symposium Gatwick, UK, 30 October - 2 November 1990.

by Daniels, B. K.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kent : Elsevier Science, 2014Copyright date: ©1990Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TJ212.2 -- .S239 1990.
12.
Windows server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows server 2012 security solutions / Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder.

by Shinder, Thomas W | Diogenes, Yuri | Shinder, Debra Littlejohn.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Elsevier, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.774.M434 S55 2013eb.
13.
Security Management of Next Generation Telecommunications Networks and Services.

by Jacobs, Stuart.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
14.
Malware Forensics Field Guide for Linux Systems : Digital Forensics Field Guides

by Malin, Cameron H | Casey, Eoghan | Aquilina, James M.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .M384 2013.
15.
The Basics of Digital Privacy : Simple Tools to Protect Your Personal Information and Your Identity Online

by Cherry, Denny.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
16.
Mastering Windows Server 2012 R2.

by Minasi, Mark | Greene, Kevin | Booth, Christian | Butler, Robert | McCabe, John | Panek, Robert | Rice, Michael | Roth, Stefan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76 .M384 2013.
17.
Rapid acquisition and fielding for information assurance and cyber security in the Navy / Isaac R. Porche III, Shawn McKay, Megan McKernan, Robert W. Button, Bob Murphy, Kate Giglio, Elliot Axelband.

by Porche, Isaac, 1968- [author.] | McKay, Shawn [author.] | McKernan, Megan [author.] | Button, Robert [author.] | Giglio, Kate [author.] | National Defense Research Institute (U.S.) | Rand Corporation.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Santa Monica, CA : RAND Corporation, 2012Copyright date: ©2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: VB212 .P67 2012.
18.
Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics / edited by Ronald Deibert [and 3 others].

by Deibert, Ronald [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridge, MA : MIT Press, ©2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HM851 .A253 2012.
19.
Group policy : fundamentals, security, and the managed desktop / Jeremy Moskowitz.

by Moskowitz, Jeremy.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Wiley, [2010]Copyright date: ©2010Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: QA76.76.O63 M6966 2010.
20.
Privacy-respecting intrusion detection / by Ulrich Flegel.

by Flegel, Ulrich.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 F54 2007.