Your search returned 38 results.

1.
Anomaly detection as a service : challenges, advances, and opportunities / Danfeng Yao ... [et al.]

by Yao, Danfeng | Shu, Xiaokui | Cheng, Long | Stolfo, Salvatore J.

Series: Synthesis Lectures on Information Security, Privacy, and Trust SeriesPublication details: Switzerland Springer International Publishing AG 2022Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76 Yao (1).

2.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

3.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Bart R. McDonough

by McDonough, Bart R | BC.

Publication details: John Wiley & Sons, Inc. 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Mac (1).

4.
(A) data-driven computer defense : a way to improve any computer defense / Roger A. Grimes

by Grimes, Roger A | BC.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Gri (1).

5.
Security risk management : building an information security risk management program from the ground up / Evan Wheeler

by Wheeler, Evan.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: TK 5105.59 Whe (1).

6.
(The) basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25And (2).

7.
Corporate computer security / Randall J. Boyle, Raymond R. Panko

by Boyle, Randall J | Panko, Raymond R.

Edition: 4th global ed.Publication details: Pearson Education 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 A25Boy (1), FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Boy (2).

8.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco

by DeFranco, Joanna F.

Publication details: CRC Press 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Def (1).

9.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 4th ed.Publication details: McFarland 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Kiz (2).

10.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams

by Williams, Barry L.

Publication details: CRC Press 2013Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Wil (1). Checked out (1).

11.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

12.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 3rd ed.Publication details: McFarland 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Kiz (3).

13.
IT audit, control, and security / Robert Moeller

by Moeller, Robert.

Publication details: J. Wiley 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: T58.5 Moe (1), ELM LIBRARY (ELM)Call number: T58.5 Moe (1).

14.
Information security risk analysis / Thomas R. Peltier

by Peltier, Thomas R | Casey, Eoghan | Altheide, Cory.

Edition: 3rd ed.Publication details: CRC Press 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Pel (1).

15.
Managing information security / John R. Vacca, editor

by Vacca, John R.

Publication details: Syngress 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Man (1).

16.
Cloud security and privacy / Tim Mather, Subra Kumaraswamy, and Shahed Latif

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Publication details: O'Reilly 2009Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Mat (1).

17.
Computer and information security handbook / edited by John R. Vacca

by Vacca, John R.

Publication details: Elsevier/M. Kaufmann 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Com (1).

18.
Management of information security / Michael Whitman, Herbert Mattord

by Whitman, Michael | Mattord, Herbert.

Edition: 3rd ed.Publication details: Course Technology Cengage Learning 2010Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Whi (1). Damaged (1).

19.
E-security law and strategy / Zaid Hamzah

by Zaid Hamzah.

Publication details: LexisNexis 2005Availability: Items available for loan: ELM LIBRARY (ELM)Call number: K564 C6Zai (1).

20.
Business continuity and disaster recovery for InfoSec managers / John W. Rittinghouse, James F. Ransome

by Rittinghouse, John W | Ransome, James F.

Publication details: Elsevier Digital Press 2005Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF5548.37 Rit (1).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha