Call Number (LC) Title Results
QA76.9.A25 D66 2012 Cryptographic protocol security analysis based on trusted freshness /
Data privacy management and autonomous spontaneous security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers /
2
QA76.9.A25 D66 2021 Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2021 international workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021 : revised selected papers / 1
QA76.9.A25 D66 2022i Enhancing cooperations to address criminal and terrorist use of ICTs operationalizing norms of responsible state behaviour in cyberspace /
Cyber stability conference towards a more secure cyberspace : 2021 conference report.
2
QA76.9.A25 D66 2023i Operationalizing a directory of points of contact for cyber confidence-building measures 1
QA76.9.A25 D663 2018 Understanding Security Issues / 1
QA76.9.A25 D73 2023i Drawing parallels a multi-stakeholder perspective on the cyber PoA scope, structure and content : multi-stakeholder workshop on the programme of action. 1
QA76.9.A25 D75 2006 The art of software security assessment : identifying and preventing software vulnerabilities / 1
QA76.9.A25 D75 2007 The art of software security assessment : identifying and preventing software vulnerabilities / 1
QA76.9.A25 D76 2005 Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / 1
QA76.9.A25 D76 2005eb Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / 1
QA76.9.A25 D78 2010 Epidemics and rumours in complex networks / 1
QA76.9.A25 D78 2010eb Epidemics and Rumours in Complex Networks / 1
QA76.9.A25 D8152 2008eb Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography /
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography /
2
QA76.9.A25 D83 2009 Eleventh hour security+ exam SYO-201 study guide / 1
QA76.9.A25 .D86 2014 CompTIA security+ (exam SY0-401) / 1
QA76.9.A25 D86 2021 Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) / 1
QA76.9.A25 D87 2008eb Cyber-security and threat politics : US efforts to secure the information age / 2
QA76.9.A25 D87 2022 Cyber security : issues and current trends / 1
QA76.9.A25 E24 2023 Data engineering with AWS : acquire the skills to design and build AWS-based data transformation pipelines like a pro / 1
QA76.9.A25 E26 2013 Economics of information security and privacy III 1