Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 L6 1986 | Foiling the system breakers : computer security and access control / | 1 |
QA76.9.A25 L633 2022 | Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions / | 1 |
QA76.9.A25 L64 2012eb | An introduction to hacking and crimeware : a pocket guide / | 1 |
QA76.9.A25 L65 2008eb |
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing / No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing / |
3 |
QA76.9.A25 L657 2020 | Cybersecurity in Humanities and Social Sciences A Research Methods Approach. | 1 |
QA76.9.A25 L66 1987 | Data & computer security : dictionary of standards, concepts and terms / | 1 |
QA76.9.A25 L66 1989eb | Data & Computer Security : Dictionary of standards concepts and terms / | 1 |
QA76.9.A25 L67 1992b | Information security : dictionary of concepts, standards and terms / | 1 |
QA76.9.A25 L67 2013 | Practical anonymity : hiding in plain sight online / | 1 |
QA76.9.A25 L68 2012 |
Low tech hacking : street smarts for security professionals / Low tech hacking street smarts for security professionals / |
3 |
QA76.9.A25 L68 2015eb | Cyber-physical attacks : a growing invisible threat / | 2 |
QA76.9.A25 L684 2013 | Simple steps to data encryption : a practical guide to secure computing / | 1 |
QA76.9.A25 L83 1998 | Basic methods of cryptography / | 1 |
QA76.9.A25 L84 2003 | The effective incident response team / | 1 |
QA76.9.A25 .L888 2014 | Incident response & computer forensics / | 2 |
QA76.9.A25 M3135 2006eb | Machine learning and data mining for computer security methods and applications / | 1 |
QA76.9.A25 M3138 2008eb | Mainframe basics for security professionals : getting started with RACF / | 1 |
QA76.9.A25 M315 2002eb | Security planning & disaster recovery / | 1 |
QA76.9.A25 M318 2002 | Microsoft .NET Framework security / | 1 |
QA76.9.A25 M3182 2006 | Malware detection / | 1 |