1441. Data breach preparation and response : breaches are certain, impact is not /: breaches are certain, impact is not. (2016) Authors: Fowler, Kevvie Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1442. Information security policies, procedures, and standards : a practitioner's reference /: a practitioner's reference. (2017) Authors: Landoll, Douglas J Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1443. Stealing the network : how to own the box /: how to own the box. (2003) Other Names: Russell, Ryan, 1969-; Moss, Jeff Record Type: Book Extent: 1 online resource (448 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1444. Applied cryptography : protocols, algorithms, and source code in C /: protocols, algorithms, and source code in C. (2017) Authors: Schneier, Bruce, 1963- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1445. Honeypots and routers : collecting internet attacks /: collecting internet attacks. (2016) Authors: Mohammed, Mohssen, 1982-; Rehman, Habib-ur Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1446. Introduction to computer and network security : navigating shades of gray /: navigating shades of gray. (2013) Other Names: Brooks, R. R (Richard R.) Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1447. Designing and implementing Linux firewalls and QoS using netfilter, iproute2, NAT, and L7-filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes /: learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes. (2006) Other Names: Gheorghe, Lucian Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1448. Integrating Python with leading computer forensics platforms. (2016) Authors: Hosmer, Chet Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1449. Information security : policy, processes, and practices /: policy, processes, and practices. (2016) Other Names: Straub, Detmar W; Goodman, Seymour E; Baskerville, Richard Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1450. How to cheat at Windows System Administration using command line scripts. (2006) Other Names: Bhardwaj, Pawan K; Andreou, Kimon; Barber, Brian; Kleiman, Dave; Satyanarayana, Mahesh Record Type: Book Extent: 1 online resource (400 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗