Call Number (LC) Title Results
QA76.9.A25 G83 1996 Guidelines for the security of information systems. 1
QA76.9.A25 G85 2017 Guide to pairing-based cryptography / 1
QA76.9.A25 G85 2017eb Guide to pairing-based cryptography / 1
QA76.9.A25 G86 2001 Hacking cyberspace / 1
QA76.9.A25 G86 2020eb A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals / 1
QA76.9.A25 G865 2018 Hacking Cyberspace / 1
QA76.9.A25G87 2003 Windows 2000 Security. 1
QA76.9.A25 G87 2018 Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / 2
QA76.9.A25 G87 2021 Secure searchable encryption and data management / 1
QA76.9.A25 G88 2004 Cryptographic security architecture : design and verification / 1
QA76.9.A25 G88 2004eb Cryptographic security architecture : design and verification / 1
QA76.9.A25HD61 Financial Cybersecurity Risk Management : Leadership Perspectives and Guidance for Systems and Institutions. 1
QA76.9.A25 H33 2001eb Hack proofing your Web applications : the only way to stop a hacker is to think like one. 1
QA76.9.A25 H33 2002eb Hack proofing ColdFusion 1
QA76.9.A25 H33 2018 Privileged attack vectors : building effective cyber-defense strategies to protect organizations / 2
QA76.9.A25 H334 2001eb Hack proofing your e-commerce site the only way to stop a hacker is to think like one] 1
QA76.9.A25 H34 1991 Cyberpunk : outlaws and hackers on the computer frontier / 3
QA76.9.A25 H343 2013 Software test attacks to break mobile and embedded devices / 1
QA76.9.A25 H343 2014 Software test attacks to break mobile and embedded devices / 1
QA76.9.A25H343 2017 Software Test Attacks to Break Mobile and Embedded Devices. 1