Call Number (LC) Title Results
QA76.9.A25 C43 2011 Identity-based encryption 1
QA76.9.A25 C43 2015eb Cyberwarfare : information operations in a connected world / 1
QA76.9.A25 C43 2021 Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing /
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests.
5
QA76.9.A25 C4349 2021eb Cybersecurity readiness : a holistic and high-performance approach / 1
QA76.9.A25 C435 2005 Statistical methods in computer security / 2
QA76.9.A25 .C436 2014 Gitolite essentials : leverage powerful branch and user access control with Git for your own private collaborative repositories / 1
QA76.9.A25 C438 2014eb The basics of digital privacy : simple tools to protect your personal information and your identity online / 3
QA76.9.A25 C438 2020 Computer Security and Encryption An Introduction. 1
QA76.9.A25 C44 2010 Cryptographic hardware and embedded systems - CHES 2010 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings / 1
QA76.9.A25 C44 2011 Cryptographic hardware and embedded systems--CHES 2011 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / 1
QA76.9.A25 C44 2012 Cryptographic hardware and embedded systems-- CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / 1
QA76.9.A25 C443 2007 Secure programming with static analysis / 2
QA76.9.A25 .C443 2018eb Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers. 1
QA76.9.A25 C446 2010 Access Control, Security, and Trust : a Logical Approach. 1
QA76.9.A25 C446 2011 Access control, security, and trust : a logical approach / 2
QA76.9.A25 C447 2009 Cryptographic hardware and embedded systems - CHES 2009 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings / 1
QA76.9.A25 C45 2001 Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time / 1
QA76.9.A25 C454 2003b Check Point NG VPN-1/firewall-1 : advanced configuration and troubleshooting / 1
QA76.9.A25 C456 2002b Public key infrastructure implementation and design / 1
QA76.9.A25 .C456 2014eb Chinese cybersecurity and defense / 2