35986841_10216840653711318_1105697261150535680_n

Your search returned 29 results.

Sort
Results
A cryptography primer : secrets and promises / Philip N. Klein

by Klein, Philip N.

Edition: 1st edMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: New York : Cambridge University Press, 2014Availability: Items available for loan: 1 Call number: 005.82 K.P.C 2014.

Advanced persistent threat hacking : the art and science of hacking any organization / Tyler Wrightson.

by Wrightson, Tyler [author.].

Edition: 1st edMaterial type: Text Text; Format: print ; Literary form: Not fiction Copyright date: ©2015Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: 1 Call number: 005.8 W.T.A 2015.

Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: 1 Call number: 005.82 S.B.A 1996.

Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky.

by Chapman, D. Brent | Zwicky, Elizabeth D.

Edition: Minor corrections, Nov. 1995.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol, CA : O'Reilly & Associates, c1995Online access: Contributor biographical information | Publisher description Availability: Items available for loan: 1 Call number: 005.8 C.D.B 1995.

Cisco secure firewall services module (FWSM) / Ray Blair, Arvind Durai

by Blair, Ray, 1965- | Durai, Arvind | Ohio Library and Information Network.

Series: Edition: 1st edMaterial type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Indianapolis, Ind. : Cisco Press, c2009Availability: Items available for loan: 2 Call number: 005.8 B.R.C 2009, ...

Citrix access security for IT administrators

by Citrix Product Development Team | Citrix Product Development Team.

Edition: 1st edMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York, NY : McGraw-Hill, c2007Online access: Contributor biographical information | Publisher description Availability: Items available for loan: 17 Call number: 005.8 C 2007, ...

Collaboration with cloud computing : security, social media, and unified communications / Ric Messier.

by Messier, Ric.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress, 2014Availability: Items available for loan: 1 Call number: 004.678 M.R.C 2014.

Computer communications security : principles, standard protocols, and techniques / Warwick Ford.

by Ford, Warwick.

Edition: 1st edMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: 1 Call number: 005.8 F.W.C 1994.

Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy

by Stallings, William [author] | Brown, Lawrie [author].

Edition: Third editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Pearson, 2015Availability: Items available for loan: 1 Call number: 005.8 S.W.C 2015.

Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch.

by White, Gregory B | Fisch, Eric A | Pooch, Udo W, 1944-.

Series: CRC Press computer engineering seriesEdition: 1st edMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton : CRC Press, c1996Online access: Publisher description Availability: Items available for loan: 1 Call number: 005.8 W.G.C 1995.

Corporate computer security

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed. / Randall J. Boyle, Raymond R. PankoMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Pearson, c2013Availability: Items available for loan: 1 Call number: 005.8 B.R.C 2014.

Corporate computer security

by Boyle, Randall J | Panko, Raymond R.

Edition: 4TH ed. / Randall J. Boyle, Raymond R. PankoMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Pearson, c2015Availability: Items available for loan: 1 Call number: 005.8 B.R.C 2015.

Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Online access: Table of contents only Availability: Items available for loan: 8 Call number: 005.8 S.W.C 2006, ...

Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Prentice Hall, c2011Availability: Items available for loan: 7 Call number: 005.82 S.W.C 2011, ...

Cryptography and network security : principles and practice / William Stallings

by Stallings, William [author].

Edition: Seventh editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2017]Availability: Items available for loan: 5 Call number: 005.8 S.W.C 2014, ...

Gray hat hacking : the ethical hacker's handbook / Daniel Regalado [and 7 others].

by Regalado, Daniel [author.] | Ohio Library and Information Network.

Edition: Fourth edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: New York : McGraw-Hill Education, 2015Other title: Ethical hacker's handbook..Online access: Safari Books Online Connect to resource | Safari Books Online Connect to resource (off-campus) Availability: Items available for loan: 1 Call number: 005.8 R.D.G 2015.

Hacker proof : the ultimate guide to network security / by Lars Klander.

by Klander, Lars.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Las Vegas, NV : Jamsa Pres, c1997Availability: Items available for loan: 1 Call number: 005.8 K.L.H 1997.

Healthcare information security and privacy / Sean P. Murphy.

by Murphy, Sean P. (Sean Patrick), 1968- [author.].

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill Education, [2015]Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for loan: 1 Call number: 362.1068 M.S.H 2015.

Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez.

by Schou, Corey | Hernandez, Steven.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill Education, [2015]Availability: Items available for loan: 1 Call number: 005.74 S.C.I 2015.

Information security analytics : finding security insights, patterns, and anomalies in big data / Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor

by Talabis, Mark | McPherson, Robert [author] | Miyamoto, I [author] | Martin, Jason L [author] | Ohio Library and Information Network.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Massachusetts : Syngress, 2015Online access: Safari Books Online Connect to resource | Safari Books Online Connect to resource (off-campus) Availability: Items available for loan: 1 Call number: 001.64 T.M.I 2015.

Pages