Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 .C353 2017 |
ISO27001/ISO27002 : un guide de poche / ISO27001/ISO27002 : Ein Taschenführer / |
2 |
QA76.9.A25 C353 2020 | Cyber Security: Essential principles to secure your organisation | 1 |
QA76.9.A25 C36 2012 |
The economics of financial and medical identity theft Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings / |
2 |
QA76.9.A25 C368 2019 |
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity / How to manage cybersecurity risk : a security leader's roadmap with Open FAIR / |
4 |
QA76.9.A25 C369 2005 | File system forensic analysis / | 1 |
QA76.9.A25 C37 2019eb |
Tribe of hackers : cybersecurity advice from the best hackers in the world / Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors / |
5 |
QA76.9.A25 C37 2020 |
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership / Tribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership. |
3 |
QA76.9.A25 C37 2021 | Start-up secure : baking cybersecurity into your company from founding to exit / | 1 |
QA76.9.A25 C37 2022 | The security culture playbook : an executive guide to reducing risk and developing your human defense layer / | 2 |
QA76.9.A25 C37 2023 | Tactical Wireshark : a deep dive into intrusion analysis, malware incidents, and extraction of forensic evidence / | 2 |
QA76.9.A25.C373 2016 | Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition. | 1 |
QA76.9.A25 C378 2021 | Start-Up Secure Baking Cybersecurity into Your Company from Founding to Exit. | 1 |
QA76.9.A25 .C382 2010 | Cisco DCUCI quick reference / | 1 |
QA76.9.A25 .C384 2013 | Nine steps to success : an ISO27001:2013 implementation overview / | 2 |
QA76.9.A25 C384 2013 | ISO27001 / ISO27002 : a pocket guide / | 2 |
QA76.9.A25 C41 |
Proceedings - Carnahan Conference on Electronic Crime Countermeasures. Proceedings. Proceedings / |
5 |
QA76.9.A25 C4157 2005 | Windows forensics and incident recovery / | 2 |
QA76.9.A25 C42 1981 | Data security and performance overhead in a distributed architecture system / | 1 |
QA76.9.A25 C427 2011eb | Chaos-based cryptography theory, algorithms and applications / | 1 |
QA76.9.A25 C43 2006eb | Algebraic aspects of the Advanced encryption standard | 1 |