Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 P77 2004eb | Progress on cryptography 25 years of cryptography in China / | 2 |
QA76.9.A25 P78 2009 | Provable security third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings / | 1 |
QA76.9.A25 P785 2007 | Virtual honeypots : from botnet tracking to intrusion detection / | 1 |
QA76.9.A25 P787 2007eb | Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings / | 1 |
QA76.9.A25 P787 2008eb | Provable security second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings / | 1 |
QA76.9.A25 P788 2012 | CompTIA security+ SY0-301 authorized cert guide / | 1 |
QA76.9.A25 P79 2006 | Privacy in statistical databases CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings / | 1 |
QA76.9.A25 P79 2006eb | Privacy in statistical databases CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings / | 1 |
QA76.9.A25 P79 2010 | Privacy in statistical databases UNESCO chair in data privacy, international conference, PSD 2010, Corfu, Greece, September 22-24, 2010 : proceedings / | 1 |
QA76.9.A25 P82 2005 | Public-key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland / | 1 |
QA76.9.A25 P825 2008eb | Privacy in statistical databases UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings / | 1 |
QA76.9.A25 P83 1992 |
Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6 1991 : final report / Public-key cryptography state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report / |
2 |
QA76.9.A25 P85 2004 | Public key infrastructure : building trusted applications and Web services / | 1 |
QA76.9.A25 P85 2004eb |
Public key infrastructure : building trusted applications and Web services / Public key infrastructure building trusted applications and Web services / |
3 |
QA76.9.A25 P88 2004eb | A practical guide to managing information security / | 2 |
QA76.9.A25 P89 2002eb | Putting the latest z/OS security features to work / | 1 |
QA76.9.A25 QA76.9.A25 M875 2006eb QA76.9.A25M875 2006 | Multimedia Security Technologies for Digital Rights Management. | 1 |
QA76.9.A25QA76.9.D33 | Information security dictionary of concepts, standards and terms / | 1 |
QA76.9.A25QA76.76.A6 |
Practical Cyber Forensics : an Incident-Based Approach to Forensic Investigations / Practical Cyber Forensics An Incident-Based Approach to Forensic Investigations / |
2 |
QA76.9.A25 Q35 2006 | Quality of protection : security measurements and metrics / | 1 |