Your search returned 17 results.

|
1.
Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.G35 2002eb.
2.
Mastering Web Services Security.

by Hartman, Bret | Flinn, Donald J | Beznosov, Konstantin.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.M375 2003eb.
3.
Honeypots application in Internet threats detection / presented by Tomáš Sochor.

by Sochor, Tomáš [speaker.] | IGI Global [production company.].

Material type: Film Film; Format: available online remote; Type of visual material: motion picture Other title: Internet threat detection using honeypots..Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.875.I57 S635 2016.
4.
The Network Security Test Lab : A Step-by-Step Guide

by Gregg, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
5.
Understanding Network Hacks : Attack and Defense with Python

by Ballmann, Bastian.

Material type: Text Text; Format: electronic available online remote Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
6.
Network Science and Cybersecurity.

by Pino, Robinson E.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
7.
Internet Privacy Rights : Rights to Protect Autonomy

by Bernal, Paul.

Material type: Text Text; Format: electronic available online remote Publisher: Cambridge : Cambridge University Press, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: K3264.C65 B49 2014.
8.
Windows Forensic Analysis Toolkit : Advanced Analysis Techniques for Windows 8

by Carvey, Harlan.

Edition: 4th ed.Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 C3726 2014.
9.
Computational Network Science : An Algorithmic Approach

by Hexmoor, Henry.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
10.
Cyber Reconnaissance, Surveillance and Defense.

by Shimonski, Robert.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK7882.E2 S56 2014.
11.
Confidentiality and Integrity in Crowdsourcing Systems.

by Bar, Amin Ranj | Maheswaran, Muthucumaru.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.H84 | QA76.9.H84.R36 2014.
12.
Information Assurance and Security Education and Training : 8th IFIP WG 11. 8 World Conference on Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papersç.

by Dodge, Ronald C | Futcher, Lynn | Staff, United States Military Academy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2013Copyright date: ©2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .I546 2013.
13.
Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings.

by Hutchison, David | Kanade, Takeo | Kittler, Josef.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2013Copyright date: ©2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .A568 2013.
14.
An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart.

by Loewengart, Victoria [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire : IT Governance Pub., 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 L64 2012.
15.
The Web Application Hacker's Handbook : Finding and Exploiting Security Flaws

by Stuttard, Dafydd | Pinto, Marcus.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.875.I57.
16.
Securing Web services : practical usage of standards and specifications / Panos Periorellis [editor].

by Periorellis, Panos | IGI Global.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.88813 .S43 2008.
17.
Hop integrity in the Internet / by Chin-Tser Huang, Mohamed G. Gouda.

by Huang, Chin-Tser, 1971- | Gouda, Mohamed G, 1947-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H84 2006.