-
1
Analyzing computer security : a threat/vulnerability/countermeasure approach
Upper Saddle River, NJ : Prentice Hall, 2011Format: Electronic eBookFull text (Wentworth users only)
-
2
Healthcare fraud : auditing and detection guide
Hoboken, N.J. : John Wiley & Sons, 2008Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
3
Basics of contemporary cryptography for IT practitioners
Singapore ; Hackensack, NJ : World Scientific, 2005Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
4
Balancing cyber security with privacy
New York : Bloomberg, 2013Format: Electronic VideoFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
5
Security : secrets, intruders and ID tags.
[Boston] : Technology Research News, 2003Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
6
What are the new risks in ransomware?
New York, NY : Wall Street Journal, 2020Format: Electronic VideoFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
7
Gray hat Python : Python programming for hackers and reverse engineers
San Francisco : No Starch Press, 2009Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
8
Threat modeling : designing for security
Indianapolis, IN : John Wiley and Sons, 2014Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Access E-Book.
Full text (Wentworth users only)
Full text (Wentworth users only)
-
9
Futureproof : security aesthetics and the management of life
Durham : Duke University Press, 2020Format: Electronic eBookFull text (Open Access)
-
10
Distributed denial of service attack and defense
New York, NY : Springer, 2014Format: Electronic eBookAccess E-Book.
Full text (Wentworth users only)
-
11
Cloud security : a comprehensive guide to secure cloud computing
Indianapolis, Ind. : Wiley Pub., 2010Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
12
IT-Sicherheitsanalysen.
Berlin, GERMANY : De Gruyter, 2017Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
13
UMTS security
Chichester, England : John Wiley & Sons, 2003Format: Electronic eBookFull text (Wentworth users only)
-
14
Artificial intelligence and data mining approaches in security frameworks
Newark : Wiley : Scrivener Publishing, 2021Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
15
Do no harm : protecting connected medical devices, healthcare, and data from hackers and adversarial nation states
[Hoboken, New Jersey] : John Wiley & Sons, 2021Format: Electronic eBookFull text (MCPHS users only)
-
16
VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environment
Birmingham, UK : Packt Publishing, 2014Format: Electronic eBookFull text (Wentworth users only)
-
17
Information security : principles and practice
Hoboken, N.J. : Wiley, 2011
2nd ed.Format: Electronic eBookFull text (Wentworth users only)
-
18
ISeries Access for Windows V5R2 hot topics : tailored images, application administration, SSL, and Kerberos
[Place of publication not identified] : IBM, International Technical Support Organization, 2004
1st ed.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
19
Hacking exposed : malware and rootkits : security secrets & solutions
New York : McGraw-Hill Education, 2017
Second edition.Format: Electronic eBookFull text (Wentworth users only)
-
20
Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition
Birmingham, UK : Packt Publishing, 2016
Third edition.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)