Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 C43 2011 | Identity-based encryption | 1 |
QA76.9.A25 C43 2015eb | Cyberwarfare : information operations in a connected world / | 1 |
QA76.9.A25 C43 2021 |
Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing / (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests. |
5 |
QA76.9.A25 C4349 2021eb | Cybersecurity readiness : a holistic and high-performance approach / | 1 |
QA76.9.A25 C435 2005 | Statistical methods in computer security / | 2 |
QA76.9.A25 .C436 2014 | Gitolite essentials : leverage powerful branch and user access control with Git for your own private collaborative repositories / | 1 |
QA76.9.A25 C438 2014eb | The basics of digital privacy : simple tools to protect your personal information and your identity online / | 3 |
QA76.9.A25 C438 2020 | Computer Security and Encryption An Introduction. | 1 |
QA76.9.A25 C44 2010 | Cryptographic hardware and embedded systems - CHES 2010 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings / | 1 |
QA76.9.A25 C44 2011 | Cryptographic hardware and embedded systems--CHES 2011 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / | 1 |
QA76.9.A25 C44 2012 | Cryptographic hardware and embedded systems-- CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / | 1 |
QA76.9.A25 C443 2007 | Secure programming with static analysis / | 2 |
QA76.9.A25 .C443 2018eb | Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers. | 1 |
QA76.9.A25 C446 2010 | Access Control, Security, and Trust : a Logical Approach. | 1 |
QA76.9.A25 C446 2011 | Access control, security, and trust : a logical approach / | 2 |
QA76.9.A25 C447 2009 | Cryptographic hardware and embedded systems - CHES 2009 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings / | 1 |
QA76.9.A25 C45 2001 | Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time / | 1 |
QA76.9.A25 C454 2003b | Check Point NG VPN-1/firewall-1 : advanced configuration and troubleshooting / | 1 |
QA76.9.A25 C456 2002b | Public key infrastructure implementation and design / | 1 |
QA76.9.A25 .C456 2014eb | Chinese cybersecurity and defense / | 2 |