QA76.9.A25 G83 1996
|
Guidelines for the security of information systems. |
1 |
QA76.9.A25 G85 2017
|
Guide to pairing-based cryptography / |
1 |
QA76.9.A25 G85 2017eb
|
Guide to pairing-based cryptography / |
1 |
QA76.9.A25 G86 2001
|
Hacking cyberspace / |
1 |
QA76.9.A25 G86 2020eb
|
A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals / |
1 |
QA76.9.A25 G865 2018
|
Hacking Cyberspace / |
1 |
QA76.9.A25G87 2003
|
Windows 2000 Security. |
1 |
QA76.9.A25 G87 2018
|
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / |
2 |
QA76.9.A25 G87 2021
|
Secure searchable encryption and data management / |
1 |
QA76.9.A25 G88 2004
|
Cryptographic security architecture : design and verification / |
1 |
QA76.9.A25 G88 2004eb
|
Cryptographic security architecture : design and verification / |
1 |
QA76.9.A25HD61
|
Financial Cybersecurity Risk Management : Leadership Perspectives and Guidance for Systems and Institutions. |
1 |
QA76.9.A25 H33 2001eb
|
Hack proofing your Web applications : the only way to stop a hacker is to think like one. |
1 |
QA76.9.A25 H33 2002eb
|
Hack proofing ColdFusion |
1 |
QA76.9.A25 H33 2018
|
Privileged attack vectors : building effective cyber-defense strategies to protect organizations / |
2 |
QA76.9.A25 H334 2001eb
|
Hack proofing your e-commerce site the only way to stop a hacker is to think like one] |
1 |
QA76.9.A25 H34 1991
|
Cyberpunk : outlaws and hackers on the computer frontier / |
3 |
QA76.9.A25 H343 2013
|
Software test attacks to break mobile and embedded devices / |
1 |
QA76.9.A25 H343 2014
|
Software test attacks to break mobile and embedded devices / |
1 |
QA76.9.A25H343 2017
|
Software Test Attacks to Break Mobile and Embedded Devices. |
1 |