Call Number (LC) Title Results
QA76.9.A25 L6 1986 Foiling the system breakers : computer security and access control / 1
QA76.9.A25 L633 2022 Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions / 1
QA76.9.A25 L64 2012eb An introduction to hacking and crimeware : a pocket guide / 1
QA76.9.A25 L65 2008eb No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing /
No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing /
3
QA76.9.A25 L657 2020 Cybersecurity in Humanities and Social Sciences A Research Methods Approach. 1
QA76.9.A25 L66 1987 Data & computer security : dictionary of standards, concepts and terms / 1
QA76.9.A25 L66 1989eb Data & Computer Security : Dictionary of standards concepts and terms / 1
QA76.9.A25 L67 1992b Information security : dictionary of concepts, standards and terms / 1
QA76.9.A25 L67 2013 Practical anonymity : hiding in plain sight online / 1
QA76.9.A25 L68 2012 Low tech hacking : street smarts for security professionals /
Low tech hacking street smarts for security professionals /
3
QA76.9.A25 L68 2015eb Cyber-physical attacks : a growing invisible threat / 2
QA76.9.A25 L684 2013 Simple steps to data encryption : a practical guide to secure computing / 1
QA76.9.A25 L83 1998 Basic methods of cryptography / 1
QA76.9.A25 L84 2003 The effective incident response team / 1
QA76.9.A25 .L888 2014 Incident response & computer forensics / 2
QA76.9.A25 M3135 2006eb Machine learning and data mining for computer security methods and applications / 1
QA76.9.A25 M3138 2008eb Mainframe basics for security professionals : getting started with RACF / 1
QA76.9.A25 M315 2002eb Security planning & disaster recovery / 1
QA76.9.A25 M318 2002 Microsoft .NET Framework security / 1
QA76.9.A25 M3182 2006 Malware detection / 1