Your search returned 81 results.

1.
Anti-hacker tool kit / Mike Shema ... [et al.].

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Material type: Text Text; Format: print available online remote; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Female LibraryCall number: TK5105.59 .J65 2006 (1), Main LibraryCall number: TK5105.59 .J65 2006 (1).

2.
Building security : handbook for architectural planning and design / Barbara A. Nadel, editor-in-chief.

by Nadel, Barbara A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2004Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Female LibraryCall number: TH9705 .B845 2004 (2).

3.
CCNA Cisco certified network associate security study guide (Exam 640-553) / Richard Deal.

by Deal, Richard A.

Material type: Text Text; Format: print optical disc; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2009Other title: Cisco certified network associate security study guide | CCNA security Exam 640-553.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: TK5105.59 .D428 2009 (1), Female LibraryCall number: TK5105.59 .D428 2009 (1).

4.
Chaotic secure communication : principles and technologies / Kehui Sun.

by Sun, Kehui [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; Boston : De Gruyter, [2016]Availability: Items available for loan: Main LibraryCall number: TK5102.85 .S86 2016 (1), Female LibraryCall number: TK5102.85 .S86 2016 (1).

5.
CISA : certified information systems auditor study guide / David Cannon with Brian T. O'Hara and Allen Keele.

by Cannon, David L, 1962- [author.] | O'Hara, Brian T [author.] | Keele, Allen [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Sybex, a Wiley Brand, [2016]Availability: Items available for loan: Main LibraryCall number: QA76.3 .C3445 2016 (1), Female LibraryCall number: QA76.3 .C3445 2016 (1).

6.
CISA : certified information systems auditor study guide / David L. Cannon.

by Cannon, David L, 1962-.

Edition: 2nd ed.Material type: Text Text; Format: print optical disc; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley Pub., c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.3 .C3445 2008 (1), Female LibraryCall number: QA76.3 .C3445 2008 (1).

7.
Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services / Jazib Frahim, Omar Santos, Andrew Ossipov.

by Frahim, Jazib | Santos, Omar | Ossipov, Andrew.

Edition: 3rd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Cisco Press, ©2014Other title: Cisco Adaptive Security Appliance.Availability: Items available for loan: Main LibraryCall number: TK5105.59 .F73 2014 (1), Female LibraryCall number: TK5105.59 .F73 2014 (1).

8.
Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu, lead author and technical editor ; James Burton ... [et al.].

by Liu, Dale.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, c2009Availability: Items available for loan: Main LibraryCall number: TK5105.59 .L58 2009 (1), Female LibraryCall number: TK5105.59 .L58 2009 (1).

9.
CISSP exam guide / Shon Harris.

by Harris, Shon.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2008Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for loan: Female LibraryCall number: QA76.3 .H368 2008 (1), Main LibraryCall number: QA76.3 .H368 2008 (1).

10.
Cloud computing / Nayan B. Ruparelia.

by Ruparelia, Nayan [author.].

Material type: Text Text; Format: print available online remote; Literary form: Not fiction Publisher: Cambridge, Massachusetts : The MIT Press, [2016]Availability: Items available for loan: Main LibraryCall number: QA76.585 .R87 2016 (1), Female LibraryCall number: QA76.585 .R87 2016 (1).

11.
Computational network science : an algorithmic approach / Henry Hexmoor.

by Hexmoor, Henry, 1960- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham : Morgan Kaufmann Publisher, [2015]Copyright date: ©2015Availability: Items available for loan: Main LibraryCall number: TK5105.59 .H47 2015 (1), Female LibraryCall number: TK5105.59 .H47 2015 (1).

12.
Computer incident response and product security / Damir Rajnovic.

by Rajnovic, Damir, 1965-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, Ind. : Cisco Press, ©2011.2015Availability: Items available for loan: Main LibraryCall number: TK5105.59 .R35 2015 (1), Female LibraryCall number: TK5105.59 .R35 2015 (1).

13.
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrence V [author.].

Edition: Third edition. Global edition.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult; Publisher: Boston, MA : Pearson, [2015]Copyright date: ©2015Availability: Items available for loan: Main LibraryCall number: QA76.9.A25 .S55 2015 (1), Female LibraryCall number: QA76.9.A25 .S55 2015 (1).

14.
Counterterrorism and cybersecurity : total information awareness.

by Lee, Newton.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: [Place of publication not identified] : Springer, 2015Availability: Items available for loan: Main LibraryCall number: HV6432 .L44 2013 (1), Female LibraryCall number: HV6432 .L44 2013 (1).

15.
The cyber index : international security trends and realities / James Andrew Lewis, Götz Neuneck.

by Lewis, James Andrew, 1953- [author.] | Neuneck, Götz [author.] | United Nations Institute for Disarmament Research [sponsoring body.] | Center for Strategic and International Studies (Washington, D.C.) [sponsoring body.] | Universität Hamburg. Institut für Friedensforschung und Sicherheitspolitik [sponsoring body.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York ; Geneva : United Nations, 2013Availability: Items available for loan: Main LibraryCall number: U163 .L488 2013 (1).

16.
Cybervetting : Internet searches for vetting, investigations, and open-source intelligence / Edward J. Appel.

by Appel, Edward J.

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Press, 2015Availability: Items available for loan: Main LibraryCall number: HF5549.5.E429 .A67 2015 (1), Female LibraryCall number: HF5549.5.E429 .A67 2015 (1).

17.
Data communications and network security / Houston H. Carr, Charles A. Snyder.

by Carr, Houston H, 1937- | Snyder, Charles A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : McGraw-Hill Irwin, c2007Other title: Data communications & network security.Online access: Publisher description | Table of contents Availability: Items available for loan: Female LibraryCall number: TK5105.59 .C365 2007 (1), Main LibraryCall number: TK5105.59 .C365 2007 (1).

18.
Data networks : routing, security, and performance optimization / Tony Kenyon.

by Kenyon, Tony, 1960-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Digital Press, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: Main LibraryCall number: TK5105.543 .K46 2002 (1), Female LibraryCall number: TK5105.543 .K46 2002 (1).

19.
Design and security in the built environment / Linda S. O'Shea, Rula Awwad-Rafferty.

by O'Shea, Linda S | Awwad-Rafferty, Rula.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Fairchild Books, c2009Availability: Items available for loan: Female LibraryCall number: TH9705 .O84 2009 (1).

20.
Digital defense : what you should know about protecting your company's assets / Thomas J. Parenty.

by Parenty, Thomas J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Harvard Business School Press, c2003Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: HD30.38 .P37 2003 (1), Female LibraryCall number: HD30.38 .P37 2003 (1).