Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 M35 1996 | Computer hacking : detection and protection / | 1 |
QA76.9.A25 M35 2006 | Machine learning and data mining for computer security : methods and applications / | 1 |
QA76.9.A25 M35 2011 | Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / | 4 |
QA76.9.A25 M36 2004 | Modern cryptography : theory and practice / | 1 |
QA76.9.A25 M36 2007eb | Elsevier's dictionary of information security in English, German, French and Russian / | 1 |
QA76.9.A25 M36 2010 |
System assurance : beyond detecting vulnerabilities / System assurance beyond detecting vulnerabilities / |
2 |
QA76.9.A25 M36 2012 | Advances in intelligence and security informatics / | 1 |
QA76.9.A25 M3735 2020ab | Cryptography : the key to digital security, how it works, and why it matters / | 2 |
QA76.9.A25 M374 2008 | Introduction to identity-based encryption / | 1 |
QA76.9.A25 M374 2008eb |
Introduction to identity-based encryption Introduction to identity-based encryption / |
2 |
QA76.9.A25 M375 2003eb | Mastering Web services security / | 1 |
QA76.9.A25 M378 2018 | Mathematical modelling for next-generation cryptography : Crest Crypto-math Project / | 1 |
QA76.9.A25 .M384 2012 | Metasploit : Das Handbuch zum Penetration-Testing-Framework. | 1 |
QA76.9.A25 M387 2000 | Maximum Linux security : a hacker's guide to protecting your Linux server and workstation / | 1 |
QA76.9.A25 M389 2003 | Maximum Security, Fourth Edition / | 1 |
QA76.9.A25 M39 2007 | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / | 1 |
QA76.9.A25 M393 2013eb | Instant Java password and authentication security : a practical, hands-on guide to securing Java application passwords with hashing techniques / | 1 |
QA76.9.A25 M396 2007eb |
Metasploit toolkit for penetration testing, exploit development, and vulnerability research / Metasploit toolkit for penetration testing, exploit development, and vulnerability research |
2 |
QA76.9.A25 M398 2015 | Introduction to Cryptography with Open-Source Software. | 2 |
QA76.9.A25 M4249 2021 | Cyberjutsu : cybersecurity for the modern ninja / | 2 |