skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Index

Results 1 - 50 of 585  for Library Catalog (Excludes Articles)

Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Network security : a practical approach
Material Type:
Book
Add to e-Shelf

Network security : a practical approach

Jan L. Harrington

c2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .H357 2005 )()

View 2 versions
2
Handbook of security and networks
Material Type:
Book
Add to e-Shelf

Handbook of security and networks

Yang Xiao; Frank H Li; Hui Chen

2011

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .H353 2011 )()

View 2 versions
3
Computer and information security handbook
Material Type:
Book
Add to e-Shelf

Computer and information security handbook

John R Vacca

c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 C66 2009 )()

View 3 versions
4
How to cheat at securing Linux
Material Type:
Book
Add to e-Shelf

How to cheat at securing Linux

Mohan Krishnamurthy Madwachar

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .H683 2008 )()

View 2 versions
5
Build your own security lab : a field guide for network testing
Material Type:
Book
Add to e-Shelf

Build your own security lab : a field guide for network testing

Michael Gregg (Michael C.)

c2008

Available at UDM McNichols Campus Library  UDM McNichols Campus Library Circulation Desk DVD Collection  (TK 5105.59 .G73 2008 ) and other locations()

View 2 versions
6
Computer security : principles and practice
Material Type:
Book
Add to e-Shelf

Computer security : principles and practice

William Stallings author. Lawrie Brown author.

Third edition.. 2015

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 S68 2015 )()

View 2 versions
7
Principles of information security
Material Type:
Book
Add to e-Shelf

Principles of information security

Michael E. Whitman 1964- Herbert J Mattord

4th ed.. c2012

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .W559 2012 )()

View 2 versions
8
Secrets and lies : digital security in a networked world
Material Type:
Book
Add to e-Shelf

Secrets and lies : digital security in a networked world

Bruce Schneier 1963- author.

15th Anniversary edition.. 2015

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 S352 2015 )()

View 2 versions
9
Hacking for dummies
Material Type:
Book
Add to e-Shelf

Hacking for dummies

Kevin Beaver

3rd ed.. c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 B42 2010 )()

View 2 versions
10
Information assurance : dependability and security in networked systems
Material Type:
Book
Add to e-Shelf

Information assurance : dependability and security in networked systems

Yi Qian 1962-

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .I5247 2008 )()

View 2 versions
11
Document security : protecting physical and electronic content
Material Type:
Book
Add to e-Shelf

Document security : protecting physical and electronic content

Ronald L. Mendell

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 M457 2007 )()

View 2 versions
12
Computer security fundamentals
Material Type:
Book
Add to e-Shelf

Computer security fundamentals

Chuck. Easttom

2nd ed.. c2012

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 E325 2012 )()

View 2 versions
13
Fuzzing for software security testing and quality assurance
Material Type:
Book
Add to e-Shelf

Fuzzing for software security testing and quality assurance

Ari Takanen Jared DeMott; Charles Miller 1951-

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 T35 2008 )()

View 2 versions
14
Unauthorised access : physical penetration testing for IT security teams
Material Type:
Book
Add to e-Shelf

Unauthorised access : physical penetration testing for IT security teams

Wil Allsopp

c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 A45 2009 )()

View 2 versions
15
Securing the cloud : cloud computer security techniques and tactics
Material Type:
Book
Add to e-Shelf

Securing the cloud : cloud computer security techniques and tactics

J. R. Winkler (Joachim R.)

c2011

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.585 .W56 2011 )()

View 2 versions
16
Disappearing cryptography : information hiding : steganography & watermarking
Material Type:
Book
Add to e-Shelf

Disappearing cryptography : information hiding : steganography & watermarking

Peter Wayner 1964-

3rd ed.. c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .W39 2009 )()

View 2 versions
17
How to cheat at securing your network
Material Type:
Book
Add to e-Shelf

How to cheat at securing your network

Ido Dubrawsky

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .H684 2007 )()

View 2 versions
18
Network security bible
Material Type:
Book
Add to e-Shelf

Network security bible

Eric Cole Ronald L. Krutz 1938-; James W Conley

2nd ed.. c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 C5985 2009 )()

View 2 versions
19
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
Material Type:
Book
Add to e-Shelf

Techno Security's guide to managing risks : for IT managers, auditors, and investigators

Jack Wiles

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Circulation Desk CD  (QA 76.9 .A25 W547 2007 ) and other locations()

View 2 versions
20
Formal correctness of security protocols
Material Type:
Book
Add to e-Shelf

Formal correctness of security protocols

Giampaolo Bella

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .B45 2007 )()

21
Practical embedded security : building secure resource-constrained systems
Material Type:
Book
Add to e-Shelf

Practical embedded security : building secure resource-constrained systems

Timothy John Stapko

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 7895 .E42 S735 2008 )()

View 2 versions
22
AVIEN malware defense guide for the Enterprise
Material Type:
Book
Add to e-Shelf

AVIEN malware defense guide for the Enterprise

David Harley

2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A873 2007 )()

View 2 versions
23
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Material Type:
Book
Add to e-Shelf

Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger

Julie E. Mehan

2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .M44 2008 )()

View 2 versions
24
Cryptography and network security : principles and practice
Material Type:
Book
Add to e-Shelf

Cryptography and network security : principles and practice

William Stallings author.

Seventh edition.. 2017

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .S713 2017 )()

View 3 versions
25
Insider threat : protecting the enterprise from sabotage, spying, and theft
Material Type:
Book
Add to e-Shelf

Insider threat : protecting the enterprise from sabotage, spying, and theft

Eric Cole Sandra Ring

2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .C65 2006 )()

View 2 versions
26
SWS '05 : proceedings of the 2005 ACM Workshop on Secure Web Services : November 11, 2005, Fairfax, Virginia, USA : (co-located with CCS 2005)
Material Type:
Book
Add to e-Shelf

SWS '05 : proceedings of the 2005 ACM Workshop on Secure Web Services : November 11, 2005, Fairfax, Virginia, USA : (co-located with CCS 2005)

ACM Workshop on Secure Web Services Corporate Author ; ACM Workshop on Secure Web Services Maruyama, Hiroshi Contributor; Damiani, Ernesto Contributor; Association for Computing Machinery Special Interest Group on Security, Audit, and Control, Content Provider; A C M Special Interest Group Content Provider; ACM Workshop on Secure Web Services

2005

Online access

27
Network security essentials : applications and standards
Material Type:
Book
Add to e-Shelf

Network security essentials : applications and standards

William Stallings

4th ed.. c2011

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .S725 2011 )()

28
Business continuity and disaster recovery for infosec managers
Material Type:
Book
Add to e-Shelf

Business continuity and disaster recovery for infosec managers

John W. Rittinghouse James F Ransome

c2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HF 5548.37 .R58 2005 )()

View 2 versions
29
Defend I.T. : security by example
Material Type:
Book
Add to e-Shelf

Defend I.T. : security by example

Ajay Gupta Scott Laliberte

c2004

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .G86 2004 )()

30
Integrated security systems design : concepts, specifications, and implementation
Material Type:
Book
Add to e-Shelf

Integrated security systems design : concepts, specifications, and implementation

Thomas L. Norman

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .N45 2007 )()

View 2 versions
31
Wireless operational security
Material Type:
Book
Add to e-Shelf

Wireless operational security

John W. Rittinghouse James F Ransome

c2004

Check holdings()

View 2 versions
32
Threat modeling
Material Type:
Book
Add to e-Shelf

Threat modeling

Frank Swiderski Window Snyder

c2004

Check holdings()

33
Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS
Material Type:
Book
Add to e-Shelf

Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS

Saida. Davies International Business Machines Corporation. International Technical Support Organization.

1st ed.. c2005

Online access

34
Intrusion detection a machine learning approach
Material Type:
Book
Add to e-Shelf

Intrusion detection a machine learning approach

Jeffrey J.-P. Tsai Zhenwei Yu

2011

Online access

35
IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards
Material Type:
Book
Add to e-Shelf

IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards

Omar. Siliceo

c2011

Online access

36
Client-Honeypots : exploring malicious websites
Material Type:
Book
Add to e-Shelf

Client-Honeypots : exploring malicious websites

Jan Gerrit Göbel author. Andreas Dewald author.; Felix Freiling author of introduction, etc.; Kathrin Mönch editor.

2011

Online access

37
Learning Nessus for penetration testing.
Material Type:
Book
Add to e-Shelf

Learning Nessus for penetration testing.

Himanshu. Kumar

2014

Online access

38
SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
Material Type:
Book
Add to e-Shelf
39
Cybersecurity for executives : a practical guide
Material Type:
Book
Add to e-Shelf

Cybersecurity for executives : a practical guide

Gregory J. Touhill author. C. Joseph Touhill author.

2014

Online access

40
Information security risk management for ISO27001/ISO27002
Material Type:
Book
Add to e-Shelf

Information security risk management for ISO27001/ISO27002

Alan Calder 1957- Steve G Watkins

2nd ed.. c2010

Online access

41
SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux
Material Type:
Book
Add to e-Shelf

SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux

Sven Vermeulen author. Sarath Santhan cover designer.

2014

Online access

42
How to define and build an effective cyber threat intelligence capability
Material Type:
Book
Add to e-Shelf

How to define and build an effective cyber threat intelligence capability

Henry Dalziel author.

2015

Online access

43
A machine-learning approach to phishing detection and defense
Material Type:
Book
Add to e-Shelf

A machine-learning approach to phishing detection and defense

Uthman Oladipo-Akanbi author. Iraj Sadegh Amiri author.; Elahe Fazeldehkordi author.

2015

Online access

44
Hacking
Material Type:
Book
Add to e-Shelf

Hacking

Kevin M. Beaver author.

6th edition.. 2018

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 B42 2018 )()

45
Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures
Material Type:
Book
Add to e-Shelf

Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

Wojciech Mazurczyk; Steffen Wendzel; Sebastian Zander; Amir Houmansadr; Krzysztof Szczypiorski

2016

Online access

46
Handbook of information security
Material Type:
Book
Add to e-Shelf

Handbook of information security

Hossein Bidgoli

c2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .H35 2006 )()

47
Security in ad hoc and sensor networks
Material Type:
Book
Add to e-Shelf

Security in ad hoc and sensor networks

Raheem Beyah (Raheem A.), 1976- Janise McNair (Janise Yvette), 1968-; Cherita Corbett (Cherita L.)

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .B49 2010 )()

View 2 versions
48
The database hacker's handbook : defending database servers
Material Type:
Book
Add to e-Shelf

The database hacker's handbook : defending database servers

David Litchfield 1975-

c2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5105.59 .D38 2005 )()

49