Your search returned 55 results.

1.
19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York ; London : McGraw-Hill/Osborne, c2005Online access: Contributor biographical information | Publisher description Availability: Items available for loan: Female LibraryCall number: QA76.9 .A25 H6977 2005 (1).

2.
Big data : a business and legal guide / James R. Kalyvas, Michael R. Overly.

by Kalyvas, James R [author.] | Overly, Michael R [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton. FL : CRC Press, 2015Availability: Items available for loan: Main LibraryCall number: KF390.5.C6 .K35 2015 (1), Female LibraryCall number: KF390.5.C6 .K35 2015 (1).

3.
CCS '10 : proceedings of the 17th ACM Conference on Computer and Communications Security : October 4-8, 2010, Chicago, Illinois, USA / [general chair, Ehab Al-Shaer ; program chairs, Angelos D. Keromytis, Vitaly Shmatikov] ; sponsored by, ACM SIGSAC ; supported by, National Science Foundation ... [et al.].

by ACM Conference on Computer and Communications Security (17th : 2010 : Chicago, Ill.) | Al-Shaer, Ehab S, 1967- | Keromytis, Angelos | Shmatikov, Vitaly | Association for Computing Machinery. Special Interest Group on Security, Audit, and Control | Association for Computing Machinery.

Material type: Text Text; Format: electronic ; Literary form: Not fiction Publisher: New York, N.Y. : Association for Computing Machinery, c2010Other title: Proceedings of the 17th ACM Conference on Computer and Communications Security | 17th ACM Conference on Computer and Communications Security.Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 A26 2010 (1).

4.
Circuits and systems for security and privacy / edited by Farhana Sheikh, Portland, Oregon, USA, Leonel Sousa, INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal, Krzysztof Iniewski, managing editor, Emerging Technologies CMOS Inc., Vancouver, British Columbia, Canada.

by Sheikh, Farhana [editor.] | Sousa, Leonel A. (Leonel Augusto) [editor.] | Iniewski, Krzysztof, 1960- [editor.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press/Taylor & Francis Group, [2016]Availability: Items available for loan: Main LibraryCall number: TK7888.4 .C57 2016 (1), Female LibraryCall number: TK7888.4 .C57 2016 (1).

5.
CISA : certified information systems auditor study guide / David Cannon with Brian T. O'Hara and Allen Keele.

by Cannon, David L, 1962- [author.] | O'Hara, Brian T [author.] | Keele, Allen [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Sybex, a Wiley Brand, [2016]Availability: Items available for loan: Main LibraryCall number: QA76.3 .C3445 2016 (1), Female LibraryCall number: QA76.3 .C3445 2016 (1).

6.
CISA : certified information systems auditor study guide / David L. Cannon.

by Cannon, David L, 1962-.

Edition: 2nd ed.Material type: Text Text; Format: print optical disc; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley Pub., c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.3 .C3445 2008 (1), Female LibraryCall number: QA76.3 .C3445 2008 (1).

7.
Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services / Jazib Frahim, Omar Santos, Andrew Ossipov.

by Frahim, Jazib | Santos, Omar | Ossipov, Andrew.

Edition: 3rd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Cisco Press, ©2014Other title: Cisco Adaptive Security Appliance.Availability: Items available for loan: Main LibraryCall number: TK5105.59 .F73 2014 (1), Female LibraryCall number: TK5105.59 .F73 2014 (1).

8.
Citrix access security for IT administrators / Citrix Product Development Team.

by Citrix Product Development Team.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : McGraw-Hill, c2007Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Female LibraryCall number: QA76.9 .C55 C5357 2007 (1), Main LibraryCall number: QA76.9 .C55 C5357 2007 (1).

9.
Computational network science : an algorithmic approach / Henry Hexmoor.

by Hexmoor, Henry, 1960- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham : Morgan Kaufmann Publisher, [2015]Copyright date: ©2015Availability: Items available for loan: Main LibraryCall number: TK5105.59 .H47 2015 (1), Female LibraryCall number: TK5105.59 .H47 2015 (1).

10.
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrence V [author.].

Edition: Third edition. Global edition.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult; Publisher: Boston, MA : Pearson, [2015]Copyright date: ©2015Availability: Items available for loan: Female LibraryCall number: QA76.9.A25 .S55 2015 (1). Checked out (1).

11.
Computer security : 20 things every employee should know / Ben Rothke.

by Rothke, Ben.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2005Online access: Contributor biographical information Availability: Items available for loan: Female LibraryCall number: QA76.9.A25 R673 2005 (1).

12.
Computer security : art and science / Matt Bishop.

by Bishop, Matt (Matthew A.).

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, 2003Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 B56 2003 (1), Female LibraryCall number: QA76.9 .A25 B56 2003 (1).

13.
Cybercrimes : a multidisciplinary analysis.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: [Place of publication not identified] : Springer, 2014Availability: Items available for loan: Main LibraryCall number: HV6773 .C93 2010 (1), Female LibraryCall number: HV6773 .C93 2010 (1).

14.
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: First edition.Material type: Text Text; Format: print regular print ; Literary form: Not fiction Publisher: New York, N.Y. : W.W. Norton & Company, [2015]Online access: Table of contents | Click here to access online Availability: Items available for loan: Main LibraryCall number: HM846 .S362 2015 (1), Female LibraryCall number: HM846 .S362 2015 (1).

15.
Digital defense : what you should know about protecting your company's assets / Thomas J. Parenty.

by Parenty, Thomas J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Harvard Business School Press, c2003Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: HD30.38 .P37 2003 (1), Female LibraryCall number: HD30.38 .P37 2003 (1).

16.
Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti ... [et al.].

by Acquisti, Alessandro.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Auerbach Publications, c2008Online access: Table of contents only | Table of contents Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 D528 2008 (1), Female LibraryCall number: QA76.9 .A25 D528 2008 (1).

17.
The digitalization of health care : electronic records and the disruption of moral orders / Ian P. McLoughlin, Karin Garrety, Rob Wilson ; with Ping Yu, Andrew Dalley.

by McLoughlin, Ian, 1956- [author.] | Garrety, Karin [author.] | Wilson, Rob (Lecturer in information management) [author.] | Yu, Ping (Health informatics researcher) [author.] | Dalley, Andrew [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Oxford ; New York, NY : Oxford University Press, 2017Availability: Items available for loan: Main LibraryCall number: R864 .M39 2017 (1), Female LibraryCall number: R864 .M39 2017 (1).

18.
Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova.

by Manoilov, G | Radichkova, B.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English, French, German, Russian Publisher: Amsterdam ; Boston : Elsevier, 2007Other title: Dictionary of information security in English, German, French and Russian.Online access: Publisher description Availability: Items available for loan: Main LibraryCall number: REF QA76.9 .A25. M36 2007 (1), Female LibraryCall number: REF QA76.9 .A25. M36 2007 (1).

19.
Enterprise security : IT security solutions : concepts, practical experiences, technologies / edited by Walter Fumy and Jooerg Sauerbrey.

by Fumy, Walter | Sauerbrey, Joerg.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Erlangen : Publicis Corporate Publishing, c2006Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 E5465 2006 (1), Female LibraryCall number: QA76.9 .A25 E5465 2006 (1).

20.
Enterprise security architecture : a business-driven approach / John Sherwood, Andrew Clark, David Lynas.

by Sherwood, John, 1947- | Clark, Andrew, 1945- | Lynas, David, 1964-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco : CMP Books, 2005Online access: Table of contents | Publisher description Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 S466 2005 (1), Female LibraryCall number: QA76.9 .A25 S466 2005 (1).