Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
496 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
..
38
39
40
41
42
0000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
493.
Java security handbook
Java security handbook
by
Jaworski, Jamie.
https://go.oreilly.com/library-access/library/view/-/0672316021/?ar
https://learning.oreilly.com/library/view/~/0672316021
https://learning.oreilly.com/library/view/~/0672316021/?ar
Format:
Electronic Resources
494.
Java security
Java security
by
Oaks, Scott.
https://go.oreilly.com/library-access/library/view/-/1565924037/?ar
https://learning.oreilly.com/library/view/~/1565924037
https://learning.oreilly.com/library/view/~/1565924037/?ar
Format:
Electronic Resources
495.
Applied cryptography : protocols, algorithms, and source code in C
Applied cryptography : protocols, algorithms, and source code in C
by
Schneier, Bruce, 1963-
https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar
https://learning.oreilly.com/library/view/~/9780471117094/?ar
Format:
Electronic Resources
496.
Enterprise-wide security solutions presentation guide
Enterprise-wide security solutions presentation guide
by
Kigma, Cees.
https://go.oreilly.com/library-access/library/view/-/0738402087/?ar
https://learning.oreilly.com/library/view/~/0738402087/?ar
Format:
Electronic Resources
Select All
1
..
38
39
40
41
42
496 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Subject: Computer Security
Included
Subject: Computer security.
Author
Include
Exclude
Safari, an O'Reilly Media Company.
(16)
International Business Machines Corporation. International Technical Support Organization.
(9)
Manning (Firm), publisher.
(6)
Bücker, Axel.
(5)
Hassan, Nihad A., author.
(4)
Santos, Omar, presenter.
(4)
Dalziel, Henry, author.
(3)
Gupta, Sunil, speaker.
(3)
International Business Machines Corporation. International Technical Support Organization, issuing body.
(3)
O'Reilly for Higher Education (Firm), distributor.
(3)
Pearson (Firm), publisher.
(3)
Rahalkar, Sagar, author.
(3)
Seacord, Robert C.
(3)
Ackerman, Pascal, author.
(2)
Andress, Jason, author.
(2)
Beale, Jay.
(2)
Bertocci, Vittorio.
(2)
Bishop, Matt (Matthew A.), author.
(2)
Bücker, Axel, author.
(2)
Carpenter, Perry, author.
(2)
Carvey, Harlan A.
(2)
Carvey, Harlan A., author.
(2)
Chio, Clarence.
(2)
Conrad, Peter, author.
(2)
Diogenes, Yuri, author.
(2)
Elisan, Christopher C., author.
(2)
Foster, James C.
(2)
Freeman, David, 1979- author.
(2)
Garfinkel, Simson.
(2)
Haber, Morey J.
(2)
Hijazi, Rami, author.
(2)
Hurley, Chris.
(2)
Jaswal, Nipun, author.
(2)
Jaswal, Nipun.
(2)
Klein, Tobias.
(2)
Knox, David (David C.)
(2)
Koziol, Jack.
(2)
Krausz, Michael.
(2)
Krutz, Ronald L., 1938-
(2)
Lakhani, Aamir, presenter.
(2)
Lambros, Kyriakos P., author.
(2)
Messier, Ric, author.
(2)
Messier, Ric.
(2)
Moskowitz, Jeremy.
(2)
O'Reilly & Associates, publisher.
(2)
O'Reilly (Firm)
(2)
O'Reilly (Firm), publisher.
(2)
Ozkaya, Erdal, author.
(2)
Packt Publishing, publisher.
(2)
Parker, Carey, author.
(2)
Paul, Mano.
(2)
Podjarny, Guy, author.
(2)
Potter, Bruce.
(2)
Richard, Philippe, author.
(2)
Rogers, Russ.
(2)
Sanbower, Jamie, author.
(2)
Santos, Omar, on-screen presenter.
(2)
Santuka, Vivek, author.
(2)
Sarraj, Saad, presenter.
(2)
Scambray, Joel.
(2)
Schneier, Bruce, 1963- author.
(2)
Seitz, Justin, author.
(2)
Sharma, Himanshu, author.
(2)
Sharp, Matthew K., author.
(2)
Sletten, Brian, on-screen presenter.
(2)
Viega, John.
(2)
White, Bill, author.
(2)
Wiles, Jack.
(2)
Woland, Aaron T., author.
(2)
Wong, David (Cryptography engineer), author.
(2)
Zdziarski, Jonathan A.
(2)
Addison-Wesley Professional (Firm), publisher.
(1)
Addison-Wesley Professional (Firm), publisher. )
(1)
Afzal, Imran, speaker.
(1)
Ahmad, David R. Mirza.
(1)
Ahmed, Mohiuddin (Computer scientist), editor.
(1)
Akanbi, Oluwatobi Ayodeji, author.
(1)
Alani, Mohammed M., author.
(1)
Albing, Carl, author.
(1)
Alder, Raven.
(1)
Ali, Shakeel, author.
(1)
Allen, Christopher, contributor.
(1)
Allen, Lee (Information security specialist), author.
(1)
Alvarado, Ellen.
(1)
Alves, Edi Lopes, author.
(1)
Amberg, Eric, author
(1)
Amini, Rob.
(1)
Amiri, Iraj Sadegh, 1977- author.
(1)
Anbalahan, Siddharth, author.
(1)
Anderson, Ross, 1956-
(1)
Anley, Chris.
(1)
Anonymous, author.
(1)
Anson, Steve.
(1)
Arcuri, Jennifer, author.
(1)
Arnold, Isabel, author.
(1)
Aslam, Abdul, author.
(1)
Aurnou, Scott, on-screen presenter.
(1)
Ayala, Luis, author.
(1)
Babbin, Jacob.
(1)
Baca, Steve, author.
(1)
Bachaalany, Elias, author.
(1)
Bachrach, Daniel G., author.
(1)
Bailey, Tucker, author.
(1)
Bais, Teo, author.
(1)
Baker, Andrew R.
(1)
Baker, Caleb, 1974-
(1)
Barker, Dylan.
(1)
Barker, William.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bathurst, Robert.
(1)
Baucom, Michael, author.
(1)
Baumrucker, C. Tate, author.
(1)
Bayles, Aaron W.
(1)
Beaver, Kevin.
(1)
Bell, Laura, author.
(1)
Ben-Natan, Ron.
(1)
Berninger, Matt, author.
(1)
Bettany, Andrew, author.
(1)
Bierer, Doug.
(1)
Biles, Simon.
(1)
Bird, Jim, author.
(1)
Bishop, Matthew A. (Matthew A.) author.
(1)
Blum, Dan.
(1)
Bodmer, Sean, author.
(1)
Bollinger, Jeff, author.
(1)
Boonkrong, Sirapat, author.
(1)
Borges, Dan.
(1)
Bose, S., author.
(1)
Boutaba, Raouf, author.
(1)
Bowman, Courtney, author.
(1)
Brabetz, Sebastian, author.
(1)
Bramwell, Phil, author.
(1)
Bravo, Cesar.
(1)
Brenton, Chris.
(1)
Brindley, Ed.
(1)
Brooks, R. R. (Richard R.)
(1)
Brotby, W. Krag, author.
(1)
Brown, Keith, 1967 March 16-
(1)
Brumfield, Cynthia, presenter.
(1)
Brunton-Spall, Michael, author.
(1)
Brunton-Spall, Michael, on-screen presenter.
(1)
Buchanan, Cameron, author.
(1)
Burnett, Mark (Mark M.)
(1)
Burns, Bryan.
(1)
Bursell, Mike, author.
(1)
Burton, James D., author.
(1)
Busch, Rebecca S.
(1)
Cada, Libor, author.
(1)
Calder, Alan, 1957-
(1)
Calder, Alan, 1957- author.
(1)
Campara, Djenana.
(1)
Campbell, Douglas E., 1954- author.
(1)
Cannon, J., author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carmiel, Yishay, on-screen presenter.
(1)
Carnegie Mellon University. CERT Coordination Center.
(1)
Casaletto, James.
(1)
Case, Andrew (Digital forensics researcher), author.
(1)
Casey, Eoghan.
(1)
Castaldo, Chris, author.
(1)
Cerra, Allison, author.
(1)
Chaganti, Venkata S. R. R.
(1)
Challener, David.
(1)
Chapman, Brent.
(1)
Chatterjee, Rithik, author.
(1)
Chauhan, Ajay Singh, author.
(1)
Chen, An, author.
(1)
Chen, Jiaxin, translator.
(1)
Cherry, Denny.
(1)
Cheruvu, Sunil, author.
(1)
Chess, Brian.
(1)
Chikofsky, Elliot J.
(1)
Chodavarapu, Prasad.
(1)
Cisco Systems, Inc.
(1)
Clark, Andrew, 1945- author.
(1)
Clark, Champ, III.
(1)
Clarke, Nathan.
(1)
Clements, Bob, author.
(1)
Coble, Deana, author.
(1)
Cohen, Yoav, author.
(1)
Cole, Eric, author.
(1)
Cole, Eric.
(1)
Coles, Matthew J., author.
(1)
Collberg, Christian.
(1)
Computing Technology Industry Association.
(1)
Conti, Greg.
(1)
Conway, Edna, presenter.
(1)
Coombs, Ted, author.
(1)
Copeland, Marshall.
(1)
Coulson, Andy, author.
(1)
Coulsonr, Andy, author.
(1)
Couretas, Jerry M., 1966- author.
(1)
Cowen, David.
(1)
Cox, Kerry.
(1)
Craig, Paul.
(1)
Cranor, Lorrie Faith.
(1)
Crawley, Kim, author.
(1)
Credle, Rufus, author.
(1)
Cross, Michael, 1965-
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(496)
Language
Include
Exclude
English
(476)
German
(10)
Chinese
(4)
Undetermined
(3)
Polish
(2)
Japanese
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2022
(46)
2019
(44)
2021
(38)
2015
(36)
2018
(36)
2016
(33)
2020
(32)
2014
(28)
2017
(24)
2011
(21)
2012
(21)
2010
(19)
2005
(18)
2008
(17)
2013
(15)
2007
(14)
2009
(13)
2003
(11)
2004
(11)
2006
(10)
2002
(8)
2001
(4)
2000
(3)
3
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(494)
Electronic books.
(214)
Computer networks -- Security measures.
(164)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(164)
COMPUTERS -- Security -- General.
(98)
COMPUTERS -- Networking -- Security.
(59)
COMPUTERS -- Internet -- Security.
(55)
Data protection.
(41)
Protection de l'information (Informatique)
(40)
Penetration testing (Computer security)
(28)
Tests d'intrusion.
(27)
Computers -- Access control.
(25)
Ordinateurs -- Accès -- Contrôle.
(25)
Microsoft Windows (Computer file)
(23)
Engineering & Applied Sciences.
(19)
Films de formation.
(18)
Hackers.
(18)
Hacking.
(18)
Instructional films.
(18)
Pirates informatiques.
(18)
Computer Science.
(17)
Computer crimes -- Prevention.
(17)
Films autres que de fiction.
(17)
Internet videos.
(17)
Nonfiction films.
(17)
Operating systems (Computers)
(17)
Piratage informatique.
(17)
Systèmes d'exploitation (Ordinateurs)
(17)
Vidéos sur Internet.
(17)
Webcast
(17)
operating systems.
(17)
Computer crimes -- Investigation.
(16)
Criminalité informatique -- Enquêtes.
(16)
Chiffrement (Informatique)
(15)
Data encryption (Computer science)
(15)
Internet -- Security measures.
(15)
Internet -- Sécurité -- Mesures.
(15)
Logiciels malveillants.
(15)
Malware (Computer software)
(15)
Computer networks -- Access control.
(14)
Computer crimes.
(13)
Criminalité informatique.
(13)
Information technology -- Security measures.
(13)
Technologie de l'information -- Sécurité -- Mesures.
(13)
Computersicherheit
(12)
Electronic videos.
(12)
Business enterprises -- Computer networks -- Security measures.
(11)
Cloud computing -- Security measures.
(11)
Infonuagique -- Sécurité -- Mesures.
(11)
Kali Linux.
(11)
Application software -- Development.
(10)
Computer Communication Networks
(10)
Computer networks.
(10)
Criminalistique.
(10)
Forensic Sciences
(10)
Forensic sciences.
(10)
Linux.
(10)
Logiciels d'application -- Développement.
(10)
Réseaux d'ordinateurs.
(10)
forensic science.
(10)
Bases de données -- Sécurité -- Mesures.
(9)
COMPUTERS -- Security -- Networking.
(9)
Cloud computing.
(9)
Cryptographie.
(9)
Cryptography.
(9)
Database security.
(9)
Infonuagique.
(9)
Java (Computer program language)
(8)
Java (Langage de programmation)
(8)
Logiciels libres.
(8)
Open source software.
(8)
Apprentissage automatique.
(7)
COMPUTERS -- Data Processing.
(7)
Computer software -- Development.
(7)
Computerbeveiliging.
(7)
Computers -- Security -- General.
(7)
Datensicherung
(7)
Information technology -- Management.
(7)
Machine learning.
(7)
Metasploit (Electronic resource)
(7)
Network security.
(7)
Python (Computer program language)
(7)
Python (Langage de programmation)
(7)
Security systems.
(7)
Systèmes virtuels (Informatique)
(7)
Technologie de l'information -- Gestion.
(7)
Virtual computer systems.
(7)
Architecture client-serveur (Informatique)
(6)
BUSINESS & ECONOMICS -- Industrial Management.
(6)
BUSINESS & ECONOMICS -- Management Science.
(6)
BUSINESS & ECONOMICS -- Management.
(6)
BUSINESS & ECONOMICS -- Organizational Behavior.
(6)
COMPUTERS -- Information Technology.
(6)
COMPUTERS -- Security -- Online Safety & Privacy.
(6)
Client/server computing.
(6)
Génie logiciel.
(6)
Oracle (Computer file)
(6)
Software engineering.
(6)
Study guides.
(6)
Artificial Intelligence
(5)
Audiobooks.
(5)
Bases de données -- Gestion.
(5)
Computer networking & communications.
(5)
Computer viruses.
(5)
Coupe-feu (Sécurité informatique)
(5)
Database management.
(5)
Downloadable audio books.
(5)
Electronic data processing personnel -- Certification.
(5)
Fabrication -- Contrôle -- Sécurité -- Mesures.
(5)
Firewalls (Computer security)
(5)
Livres audio.
(5)
Process control -- Security measures.
(5)
Risk Assessment
(5)
Risk assessment.
(5)
Virus informatiques.
(5)
z/OS.
(5)
Évaluation du risque.
(5)
Application software -- Development -- Automation.
(4)
Applications Web -- Sécurité -- Mesures.
(4)
Artificial intelligence.
(4)
C (Computer program language)
(4)
C (Langage de programmation)
(4)
COMPUTERS -- Computer Literacy.
(4)
COMPUTERS -- Computer Science.
(4)
COMPUTERS -- Hardware -- General.
(4)
COMPUTERS -- Machine Theory.
(4)
COMPUTERS -- Networking -- General.
(4)
COMPUTERS -- Programming Languages -- Java.
(4)
COMPUTERS -- Reference.
(4)
COMPUTERS -- Security -- Viruses & Malware.
(4)
Computer software -- Testing.
(4)
Computers and IT.
(4)
Debugging in computer science.
(4)
Débogage.
(4)
Electronic information resources -- Access control.
(4)
IBM computers -- Security measures.
(4)
Information Systems
(4)
Information storage and retrieval systems.
(4)
Informatique.
(4)
Intelligence artificielle.
(4)
Logiciels d'application -- Développement -- Automatisation.
(4)
Mac OS.
(4)
Management information systems -- Security measures.
(4)
Privacy, Right of.
(4)
Reverse engineering.
(4)
Rétro-ingénierie.
(4)
Sites Web -- Sécurité -- Mesures.
(4)
Sources d'information électroniques -- Accès -- Contrôle.
(4)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(4)
Systèmes d'information.
(4)
Transmission sans fil -- Sécurité -- Mesures.
(4)
Web applications -- Security measures.
(4)
Web sites -- Security measures.
(4)
Wireless communication systems -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Architecture logicielle.
(3)
Business -- Data processing -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
C++ (Computer program language)
(3)
C++ (Langage de programmation)
(3)
COMPUTERS -- Operating Systems -- Linux.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer science.
(3)
Corporate culture.
(3)
Criminalité informatique -- Enquêtes -- Méthodologie.
(3)
Culture d'entreprise.
(3)
Cyberterrorism.
(3)
Cyberterrorisme.
(3)
Electrical & Computer Engineering.
(3)
Electronic Data Processing
(3)
Electronic commerce -- Security measures.
(3)
Entreprises -- Sécurité -- Mesures.
(3)
Gestion -- Informatique -- Sécurité -- Mesures.
(3)
Internet
(3)
Internet.
(3)
JavaScript (Computer program language)
(3)
JavaScript (Langage de programmation)
(3)
LAW -- Forensic Science.
(3)
Logiciels -- Protection.
(3)
Logiciels d'application -- Sécurité -- Mesures.
(3)
Medical Informatics Applications
(3)
Microsoft .NET Framework.
(3)
Microsoft Windows (Computer file) -- Security measures.
(3)
Microsoft Windows server.
(3)
Médecine -- Informatique.
(3)
Objective-C (Computer program language)
(3)
Objective-C (Langage de programmation)
(3)
Organizational Culture
(3)
Rechnernetz
(3)
Software architecture.
(3)
Software protection.
(3)
Spring (Software framework)
(3)
Telecommunications.
(3)
United States.
(3)
iOS (Electronic resource) -- Security measures.
(3)
Active server pages.
(2)
Agile software development.
(2)
Application software.
(2)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(495)
Ebrary Collection
(1)
Library
Include
Exclude
IYTE Library
(496)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}