Call Number (LC) Title Results
QA76.9.A25 F38 1996 Fast software encryption : third International workshop, Cambridge, UK, February 21-23, 1996 : proceedings / 1
QA76.9.A25 F38 2012 Fault analysis in cryptography 1
QA76.9.A25 .F384 2012 IT-Sicherheit & Datenschutz. 1
QA76.9.A25 F43 2013 Federated identity primer /
Federated identity primer
3
QA76.9.A25 F466 2003 Practical cryptography / 1
QA76.9.A25 F466 2010eb Cryptography engineering : design principles and practical applications /
Cryptography engineering design principles and practical applications /
2
QA76.9.A25 F47 2003 Role-based access control / 1
QA76.9.A25 F47 2003eb Role-based access control / 1
QA76.9.A25 F47 2007eb Role-based access control / 2
QA76.9.A25 F472 2010 Access control in data management systems 1
QA76.9.A25 F477 2007 Role-based access control / 1
QA76.9.A25 F525 2003 Finding and fixing vulnerabilities in information systems : the Vulnerability Assessment & Mitigation methodology / 1
QA76.9.A25 F525 2003eb Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology / 3
QA76.9.A25 F5334 2000 Secure computers and networks : analysis, design, and implementation / 1
QA76.9.A25 F5336 2001 IT-security and privacy : design and use of privacy-enhancing security mechanisms / 1
QA76.9.A25 F54 2007 Privacy-respecting intrusion detection / 1
QA76.9.A25 F54 2007eb Privacy-respecting intrusion detection 1
QA76.9.A25 F55 2014 FileVault 2 for Mac OS X decoded / 1
QA76.9.A25 F57 2013 FISMA and the risk management framework : the new practice of federal cyber security /
FISMA and the risk management framework the new practice of federal cyber security /
2
QA76.9.A25 F65 2004 Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / 1