Refine your search

Your search returned 105 results.

Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Publisher: Amsterdam ; Boston : Burlington, MA : Elsevier ; Morgan Kaufmann, c2009Online access: Publisher description Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 C739 2009] (1).

Securing PCs and data in libraries and schools : a handbook with menuing, anti-virus, and other protective software / Allen C. Benson.

by Benson, Allen C [author].

Language: English Publisher: New York : Neal-Schuman Publishers, c1997Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 B443 1997] (2).

The electronic privacy papers : documents on the battle for privacy in the age of surveillance / [edited by] Bruce Schneier, David Banisar .

by Banisar, David [editor] | Schneier, Bruce, 1963- [editor].

Publisher: New York : John Wiley , [1997]Copyright date: c1997Availability: Items available for loan: COLLEGE LIBRARY [Call number: 323.4480973 El38 1997] (1).

Web commerce security : design and development / Hadi Nahari, Ronald L. Krutz.

by Nahari, Hadi | Krutz, Ronald L.

Publisher: Indianapolis : Wiley Pub., c2011Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: COLLEGE LIBRARY [Call number: 658.478 N14 2011] (1).

Networking security

Language: English Publisher:  USA :  3G E-Learning LLC, [2017]Copyright date: c2017Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 N389 2017] (1).

 Software project management

Language: English Publisher: USA : 3G E-Learning LLC, [2017]Copyright date: c2017Availability: No items available Checked out (1).

Reversing : secrets of reverse engineering / Eldad Eilam ; [foreword by Elliot Chikofsky].

by Eilam, Eldad | Chikofsky, Elliot J.

Publisher: Indianapolis, Indiana : Wiley, c2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.1 Ei51 2005] (1).

Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies / edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee.

by Le, Dac-Nhuong, 1983- [editor.] | Kumar, Raghvendra, 1987- [editor.] | Mishra, Brojo Kishore, 1979- [editor.] | Khari, Manju [editor.] | Chatterjee, Jyotir Moy [editor.].

Edition: First edition.Language: English Publisher: Hoboken, NJ : Scrivener Publishing/Wiley, 2019Online access: Full text is available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 C9921 2019] (1).

Cybersecurity blue team toolkit / Nadean Tanner.

by Tanner, Nadean.

Language: English Publisher: Indianapolis, IN : John Wiley and Sons, 2019Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 T1573 2019] (1).

Cyber-Vigilance and digital trust : cyber security in the era of cloud computing and IoT / edited by Wiem Tounsi.

by Tounsi, Wiem [editor].

Language: English Publisher: London, UK : ISTE, Ltd. ; Hoboken, NJ : John Wiley & Sons, Inc., 2019Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 C9921 2019] (1).

An introduction to cyber modeling and simulation / Jerry M. Couretas.

by Couretas, Jerry M, 1966- [author.].

Language: English Publisher: Hoboken, NJ : John Wiley & Sons, 2019Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 C8341 2019] (1).

Artificial immune system : applications in computer security / Ying Tan.

by Tan, Ying, 1964- [author.].

Language: English Publisher: Hoboken : John Wiley & Sons Inc., 2016Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 T1532 2016] (1).

Social engineering : the science of human hacking / Christopher Hadnagy.

by Hadnagy, Christopher [author.] | Wozniak, Steve, 1950- [writer of foreword.].

Edition: Second edition.Language: English Publisher: Indianapolis, IN : Wiley, [2018]Online access: Full text is available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 H1179 2018] (1).

Advanced persistent threat hacking : the art and science of hacking any organization / Tyler Wrightson.

by Wrightson, Tyler [author.].

Language: English Publisher: New York : McGraw-Hill Education, [2015]Copyright date: ©2015Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 W938 2015] (1).

Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963- [author.].

Edition: 2nd edition.Publisher: New York, New York : Bruce Schneier, c1996Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.82 Sch588 1996] (1).

Hacking exposed J2EE & Java : developing secure applications with Java technology / Brian Buege, Randy Layman, Art Taylor.

by Buege, Brian [author] | Taylor, Art, 1958- | Layman, Randy.

Language: English Publisher: New York : McGraw-Hill/Osborne, c2002Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 B861 2002] (1).

Routledge handbook of international cybersecurity / edited by Eneken Tikk and Mika Kerttunen.

by Tikk, Eneken, 1976- [editor.] | Kerttunen, Mika, 1961- [editor.].

Publisher: New York : Routledge, Taylor & Francis Group, [2020]Online access: Click here to access online Availability: Items available for reference: COLLEGE LIBRARY [Call number: 303.48/34] (1).

Introduction to computer security / Michael T. Goodrich and Roberto Tamassia.

by Goodrich, Michael T [author.] | Tamassia, Roberto, 1960- [author.].

Publisher: Boston : Pearson, c2011Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 G625 2011] (1).

Managing risk in information systems / Darril Gibson.

by Gibson, Darril [author.].

Publisher: Sudbury, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 G357 2011] (1).

Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati

by Acquisti, Alessandro [author.] | Gritzalis, Stefanos [author.] | Lambrinoudakis, Costas [author.] | De Capitani di Vimercati, Sabrina [author.].

Publisher: New York : Auerback Publications, c2008Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 D569 2008] (1).