Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 F85 2014eb | Intrusion detection networks : a key to collaborative security / | 2 |
QA76.9.A25 F86 2021 | Functional encryption / | 1 |
QA76.9.A25 F87 2005 | Multimedia security handbook / | 2 |
QA76.9.A25 F87 2005eb | Computer insecurity risking the system / | 1 |
QA76.9.A25 .F87 2019ebd | Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence / | 2 |
QA76.9.A25 F88 2009eb | The future of identity in the information society challenges and opportunities / | 1 |
QA76.9.A25 F888 2009 | Future of trust in computing proceedings of the first international conference Future of Trust in Computing 2008 / | 1 |
QA76.9.A25 F89 2018eb | Fuzzing for software security testing and quality assurance / | 2 |
QA76.9.A25 G278 2014 | Usable security : history, themes, and challenges / | 1 |
QA76.9.A25 G35 2002eb | Cryptography for Internet and database applications : developing secret and public key techniques with Java / | 1 |
QA76.9.A25 G35 2020 |
Decision and Game Theory for Security : 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings / Security and cryptography for networks : 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings / |
2 |
QA76.9.A25 G35 2020eb | The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / | 4 |
QA76.9.A25 G356 2006 | Hunting security bugs / | 1 |
QA76.9.A25 G358 2008eb | Mastering System Center Data Protection Manager 2007 / | 1 |
QA76.9.A25 G36 2011 | Decision and game theory for security second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / | 1 |
QA76.9.A25 G45 2007eb | Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them / | 1 |
QA76.9.A25 G46 2016eb | Audio content security : attack analysis on audio watermarking / | 2 |
QA76.9.A25 G47 2011 | Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären / | 1 |
QA76.9.A25 G53 2015eb | Managing risk in information systems, second edition / | 1 |
QA76.9.A25 G535 2014 | Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / | 1 |