Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 B857 2017 | Wireshark for security professionals : using Wireshark and the Metasploit framework / | 1 |
QA76.9.A25 B875 2006 | Perfect passwords : selection, protection, authentication / | 1 |
QA76.9.A25 B875 2006 | Perfect passwords : selection, protection, authentication / | 1 |
QA76.9.A25 B875 2006eb |
Perfect passwords : selection, protection, authentication / Perfect passwords selection, protection, authentication / |
3 |
QA76.9.A25 B97 2021 | Full stack Python security cryptography, TLS, and attack resistance / | 1 |
QA76.9.A25 C258 2007eb | A dictionary of information security terms, abbreviations and acronyms / | 1 |
QA76.9.A25 C335 2002eb | Protect your digital privacy! : survival skills for the information age / | 3 |
QA76.9.A25 C34188 2005 | A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / | 1 |
QA76.9.A25 C34189 2006 | International IT governance : an executive guide to ISO 17799/ISO 27001 / | 1 |
QA76.9.A25 C341895 2007eb | Information security risk management for ISO27001 / ISO17799 / | 1 |
QA76.9.A25 C341895 2010 | ISO27000 and information security : a combined glossary / | 1 |
QA76.9.A25 C341895 2010eb | ISO27000 and information security : a combined glossary / | 1 |
QA76.9.A25 C342 2005 | IT governance : a manager's guide to data security and BS 7799/ISO 17799 / | 1 |
QA76.9.A25 C342 2008 |
ISO/IEC 38500 : the IT governance standard / IT governance : a manager's guide to data security and ISO 27001/ISO 27002 / |
3 |
QA76.9.A25 C342 2008eb | IT governance : a manager's guide to data security and ISO 27001/ISO 27002 / | 1 |
QA76.9.A25 C342 2015eb | IT governance : an international guide to data security and ISO27001/ISO27002 / | 2 |
QA76.9.A25 C343 2002 | IT governance : data security & BS 7799/ISO 17799 : a manager's guide to effective information security / | 1 |
QA76.9.A25 C345 2001 | Computer forensics and privacy / | 1 |
QA76.9.A25 C345 2004 | Privacy protection and computer forensics / | 1 |
QA76.9.A25 C348 2004 | Privacy protection and computer forensics / | 1 |