Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 D66 2012 |
Cryptographic protocol security analysis based on trusted freshness / Data privacy management and autonomous spontaneous security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers / |
2 |
QA76.9.A25 D66 2021 | Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2021 international workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021 : revised selected papers / | 1 |
QA76.9.A25 D66 2022i |
Enhancing cooperations to address criminal and terrorist use of ICTs operationalizing norms of responsible state behaviour in cyberspace / Cyber stability conference towards a more secure cyberspace : 2021 conference report. |
2 |
QA76.9.A25 D66 2023i | Operationalizing a directory of points of contact for cyber confidence-building measures | 1 |
QA76.9.A25 D663 2018 | Understanding Security Issues / | 1 |
QA76.9.A25 D73 2023i | Drawing parallels a multi-stakeholder perspective on the cyber PoA scope, structure and content : multi-stakeholder workshop on the programme of action. | 1 |
QA76.9.A25 D75 2006 | The art of software security assessment : identifying and preventing software vulnerabilities / | 1 |
QA76.9.A25 D75 2007 | The art of software security assessment : identifying and preventing software vulnerabilities / | 1 |
QA76.9.A25 D76 2005 | Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / | 1 |
QA76.9.A25 D76 2005eb | Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / | 1 |
QA76.9.A25 D78 2010 | Epidemics and rumours in complex networks / | 1 |
QA76.9.A25 D78 2010eb | Epidemics and Rumours in Complex Networks / | 1 |
QA76.9.A25 D8152 2008eb |
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography / Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / |
2 |
QA76.9.A25 D83 2009 | Eleventh hour security+ exam SYO-201 study guide / | 1 |
QA76.9.A25 .D86 2014 | CompTIA security+ (exam SY0-401) / | 1 |
QA76.9.A25 D86 2021 | Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) / | 1 |
QA76.9.A25 D87 2008eb | Cyber-security and threat politics : US efforts to secure the information age / | 2 |
QA76.9.A25 D87 2022 | Cyber security : issues and current trends / | 1 |
QA76.9.A25 E24 2023 | Data engineering with AWS : acquire the skills to design and build AWS-based data transformation pipelines like a pro / | 1 |
QA76.9.A25 E26 2013 | Economics of information security and privacy III | 1 |