Call Number (LC) Title Results
QA76.9.A25 P77 2004eb Progress on cryptography 25 years of cryptography in China / 2
QA76.9.A25 P78 2009 Provable security third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings / 1
QA76.9.A25 P785 2007 Virtual honeypots : from botnet tracking to intrusion detection / 1
QA76.9.A25 P787 2007eb Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings / 1
QA76.9.A25 P787 2008eb Provable security second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings / 1
QA76.9.A25 P788 2012 CompTIA security+ SY0-301 authorized cert guide / 1
QA76.9.A25 P79 2006 Privacy in statistical databases CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings / 1
QA76.9.A25 P79 2006eb Privacy in statistical databases CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings / 1
QA76.9.A25 P79 2010 Privacy in statistical databases UNESCO chair in data privacy, international conference, PSD 2010, Corfu, Greece, September 22-24, 2010 : proceedings / 1
QA76.9.A25 P82 2005 Public-key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland / 1
QA76.9.A25 P825 2008eb Privacy in statistical databases UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings / 1
QA76.9.A25 P83 1992 Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6 1991 : final report /
Public-key cryptography state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report /
2
QA76.9.A25 P85 2004 Public key infrastructure : building trusted applications and Web services / 1
QA76.9.A25 P85 2004eb Public key infrastructure : building trusted applications and Web services /
Public key infrastructure building trusted applications and Web services /
3
QA76.9.A25 P88 2004eb A practical guide to managing information security / 2
QA76.9.A25 P89 2002eb Putting the latest z/OS security features to work / 1
QA76.9.A25 QA76.9.A25 M875 2006eb QA76.9.A25M875 2006 Multimedia Security Technologies for Digital Rights Management. 1
QA76.9.A25QA76.9.D33 Information security dictionary of concepts, standards and terms / 1
QA76.9.A25QA76.76.A6 Practical Cyber Forensics : an Incident-Based Approach to Forensic Investigations /
Practical Cyber Forensics An Incident-Based Approach to Forensic Investigations /
2
QA76.9.A25 Q35 2006 Quality of protection : security measurements and metrics / 1