Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 .E45 2015 | Advanced Malware Analysis / | 1 |
QA76.9.A25 .E45 2017 | Hacking Exposed Malware and Rootkits : Security Secrets and Solutions, Second Edition / | 1 |
QA76.9.A25 E466 2019eb | Emerging security algorithms and techniques / | 1 |
QA76.9.A25 E467 2013eb | Emerging trends in ICT security / | 3 |
QA76.9.A25 E49 2007eb | Encryption facility for z/OS V1.2 OpenPGP support / | 1 |
QA76.9.A25 E53 2011eb | Encyclopedia of cryptography and security | 1 |
QA76.9.A25 E54 2009 | Engineering secure software and systems First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / | 1 |
QA76.9.A25 E5425 2007eb | Engaging privacy and information technology in a digital age / | 1 |
QA76.9.A25 E544 1999 | Elliptic curves and their applications to cryptography : an introduction / | 1 |
QA76.9.A25 E5443 2010eb | The basics of hacking and penetration testing ethical hacking and penetration testing made easy / | 1 |
QA76.9.A25 E5443 2011eb | The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / | 1 |
QA76.9.A25 E5443 2013eb |
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / The basics of hacking and penetration testing ethical hacking and penetration testing made easy / |
3 |
QA76.9.A25 E545 2005 | Enhanced methods in computer security, biometric and artificial intelligence systems / | 3 |
QA76.9.A25 E5457 2010 |
Enterprise Mac security MAC OS X Snow Leopard / Enterprise Mac security : MAC OS X Snow Leopard / |
2 |
QA76.9.A25 E58 2006 | Enterprise security : IT security solutions : concepts, practical experiences, technologies / | 1 |
QA76.9.A25 E63 2012 | Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager / | 1 |
QA76.9.A25 E73 2001eb | Executive's guide to privacy management / | 1 |
QA76.9.A25 E737 2005eb | Trojans, worms, and spyware : a computer security professional's guide to malicious code / | 1 |
QA76.9.A25 E74 2004b | Implementing homeland security for enterprise IT | 1 |
QA76.9.A25 E75 2003eb | Hacking : the art of exploitation / | 2 |