Call Number (LC) Title Results
QA76.9.A25 B857 2017 Wireshark for security professionals : using Wireshark and the Metasploit framework / 1
QA76.9.A25 B875 2006 Perfect passwords : selection, protection, authentication / 1
QA76.9.A25 B875 2006 Perfect passwords : selection, protection, authentication / 1
QA76.9.A25 B875 2006eb Perfect passwords : selection, protection, authentication /
Perfect passwords selection, protection, authentication /
3
QA76.9.A25 B97 2021 Full stack Python security cryptography, TLS, and attack resistance / 1
QA76.9.A25 C258 2007eb A dictionary of information security terms, abbreviations and acronyms / 1
QA76.9.A25 C335 2002eb Protect your digital privacy! : survival skills for the information age / 3
QA76.9.A25 C34188 2005 A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / 1
QA76.9.A25 C34189 2006 International IT governance : an executive guide to ISO 17799/ISO 27001 / 1
QA76.9.A25 C341895 2007eb Information security risk management for ISO27001 / ISO17799 / 1
QA76.9.A25 C341895 2010 ISO27000 and information security : a combined glossary / 1
QA76.9.A25 C341895 2010eb ISO27000 and information security : a combined glossary / 1
QA76.9.A25 C342 2005 IT governance : a manager's guide to data security and BS 7799/ISO 17799 / 1
QA76.9.A25 C342 2008 ISO/IEC 38500 : the IT governance standard /
IT governance : a manager's guide to data security and ISO 27001/ISO 27002 /
3
QA76.9.A25 C342 2008eb IT governance : a manager's guide to data security and ISO 27001/ISO 27002 / 1
QA76.9.A25 C342 2015eb IT governance : an international guide to data security and ISO27001/ISO27002 / 2
QA76.9.A25 C343 2002 IT governance : data security & BS 7799/ISO 17799 : a manager's guide to effective information security / 1
QA76.9.A25 C345 2001 Computer forensics and privacy / 1
QA76.9.A25 C345 2004 Privacy protection and computer forensics / 1
QA76.9.A25 C348 2004 Privacy protection and computer forensics / 1