Call Number (LC) Title Results
QA76.9.A25 C348 2004eb Privacy protection and computer forensics / 1
QA76.9.A25 C35 2008eb Ten rules of information security for the smaller business : a plain English guide / 1
QA76.9.A25 C35 2015eb PCI DSS : a pocket guide / 1
QA76.9.A25 .C35 2018ebd ISO27001/ISO27002 : a Pocket Guide / 1
QA76.9.A25 C35 2020 IT governance : an international guide to data security and ISO27001/ISO 27002 /
The cyber security handbook prepare for, respond to and recover from cyber attacks /
2
QA76.9.A25 C353 2005 The case for ISO 27001 / 2
QA76.9.A25 C353 2013eb The case for ISO27001-2013, second edition / 1
QA76.9.A25 .C353 2014eb Cyber essentials : a pocket guide / 1
QA76.9.A25 .C353 2017 ISO27001/ISO27002 : un guide de poche /
ISO27001/ISO27002 : Ein Taschenführer /
2
QA76.9.A25 C353 2020 Cyber Security: Essential principles to secure your organisation 1
QA76.9.A25 C36 2012 The economics of financial and medical identity theft
Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings /
2
QA76.9.A25 C368 2019 Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity /
How to manage cybersecurity risk : a security leader's roadmap with Open FAIR /
4
QA76.9.A25 C369 2005 File system forensic analysis / 1
QA76.9.A25 C37 2019eb Tribe of hackers : cybersecurity advice from the best hackers in the world /
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors /
5
QA76.9.A25 C37 2020 Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership /
Tribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership.
3
QA76.9.A25 C37 2021 Start-up secure : baking cybersecurity into your company from founding to exit / 1
QA76.9.A25 C37 2022 The security culture playbook : an executive guide to reducing risk and developing your human defense layer / 2
QA76.9.A25 C37 2023 Tactical Wireshark : a deep dive into intrusion analysis, malware incidents, and extraction of forensic evidence / 2
QA76.9.A25.C373 2016 Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition. 1
QA76.9.A25 C378 2021 Start-Up Secure Baking Cybersecurity into Your Company from Founding to Exit. 1