Call Number (LC) Title Results
QA76.9.A25 F85 2014eb Intrusion detection networks : a key to collaborative security / 2
QA76.9.A25 F86 2021 Functional encryption / 1
QA76.9.A25 F87 2005 Multimedia security handbook / 2
QA76.9.A25 F87 2005eb Computer insecurity risking the system / 1
QA76.9.A25 .F87 2019ebd Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence / 2
QA76.9.A25 F88 2009eb The future of identity in the information society challenges and opportunities / 1
QA76.9.A25 F888 2009 Future of trust in computing proceedings of the first international conference Future of Trust in Computing 2008 / 1
QA76.9.A25 F89 2018eb Fuzzing for software security testing and quality assurance / 2
QA76.9.A25 G278 2014 Usable security : history, themes, and challenges / 1
QA76.9.A25 G35 2002eb Cryptography for Internet and database applications : developing secret and public key techniques with Java / 1
QA76.9.A25 G35 2020 Decision and Game Theory for Security : 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings /
Security and cryptography for networks : 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings /
2
QA76.9.A25 G35 2020eb The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / 4
QA76.9.A25 G356 2006 Hunting security bugs / 1
QA76.9.A25 G358 2008eb Mastering System Center Data Protection Manager 2007 / 1
QA76.9.A25 G36 2011 Decision and game theory for security second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / 1
QA76.9.A25 G45 2007eb Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them / 1
QA76.9.A25 G46 2016eb Audio content security : attack analysis on audio watermarking / 2
QA76.9.A25 G47 2011 Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären / 1
QA76.9.A25 G53 2015eb Managing risk in information systems, second edition / 1
QA76.9.A25 G535 2014 Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / 1