Call Number (LC) Title Results
QA76.9.A25 H37 2004 Guide to elliptic curve cryptography / 1
QA76.9.A25 H37 2010 Microsoft Forefront threat management gateway (TMG) : administrator's companion / 1
QA76.9.A25 H37 2014eb Cryptography and network security : a practical approach / 1
QA76.9.A25 H37 2015eb Human aspects of information security, privacy, and trust : third international conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings / 1
QA76.9.A25 H375 2013 Managing risk and information security protect to enable /
Managing risk and information security : protect to enable /
2
QA76.9.A25 H377 2004b Hardening Windows 1
QA76.9.A25 H377 2006eb Hardening Windows 1
QA76.9.A25 H387 2008 OSSEC host-based intrusion detection guide / 1
QA76.9.A25 H387 2008eb OSSEC host-based intrusion detection guide /
OSSEC host-based intrusion detection guide
2
QA76.9.A25 H392 2010eb IT security metrics : a practical framework for measuring security & protecting data / 2
QA76.9.A25 H3956 2018 HCI challenges and privacy preservation in big data security / 1
QA76.9.A25 H3956 2018eb HCI challenges and privacy preservation in big data security / 1
QA76.9.A25 H435 2001eb Securing E-Business applications and communications 2
QA76.9.A25 .H454 2019 Security for software engineers / 1
QA76.9.A25 H455 2004b HP Nonstop server security : a practical handbook /
HP Nonstop server security a practical handbook /
3
QA76.9.A25 H455 2018 IT-Sicherheit : Eine Einführung. 1
QA76.9.A25 H46 2011 Managing an information security and privacy awareness and training program
Managing an information security and privacy awareness and training program /
2
QA76.9.A25 H47 2002 A practical guide to security engineering and information assurance / 3
QA76.9.A25 H47 2022 Snowflake security : securing your Snowflake data cloud / 3
QA76.9.A25 H47 2022eb Snowflake security : securing your Snowflake data cloud / 2