Your search returned 13 results.

|
1.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
2.
Complete Guide to CISM Certification.

by Peltier, Thomas R | Peltier, Justin.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2016Copyright date: ©2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.3 -- .P43 2006.
3.
Cyber Security Essentials.

by Graham, James | Olson, Ryan | Howard, Rick.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- C91915 2011.
4.
FISMA Principles and Best Practices : Beyond Compliance.

by Howard, Patrick D.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: JK468.A8 -- H68 2011.
5.
Data Mining and Machine Learning in Cybersecurity.

by Dua, Sumeet | Du, Xian.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D343 -- D825 2011.
6.
Computer Forensics JumpStart.

by Solomon, Micah | Barrett, Diane | Broom, Neil.

Material type: Text Text; Format: electronic available online remote Publisher: Alameda : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- S6556 2005eb.
7.
Data Protection : Governance, Risk Management, and Compliance.

by Hill, David G.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Baton Rouge : CRC Press, 2014Copyright date: ©2010Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- H52 2009.
8.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington : Elsevier Science, 2014Copyright date: ©2010Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M31845 2010.
9.
Managed Code Rootkits : Hooking into Runtime Environments.

by Metula, Erez.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M487 2010.
10.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'.

by Heiderich, Mario | Nava, Eduardo Alberto Vela | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625 -- .H46 2011.
11.
Security Risk Management : Building an Information Security Risk Management Program from the Ground Up.

by Wheeler, Evan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 -- .W48 2011.
12.
Securing the Cloud : Cloud Computer Security Techniques and Tactics.

by Winkler, Vic (J. R. ) | Foxhoven, Patrick.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 -- .W56 2011.
13.
Official (ISC)2 Guide to the SSCP CBK, Second Edition.

by Tipton, Harold F | Henry, Kevin.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : CRC Press, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.3 -- .O3845 2010.