Call Number (LC) Title Results
QA76.9.A25 .R35 2015 Mobile Application Security with Open-Source Tools / 1
QA76.9.A25 R35 2021 Security and Microservice Architecture on AWS : architecting and implementing a secured, scalable solution / 1
QA76.9.A25 R356 2014 Core software security : security at the source / 4
QA76.9.A25 R36 2007eb Linux firewalls : attack detection and response with iptables, psad, and fwsnort / 2
QA76.9.A25 R36 2011eb BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / 1
QA76.9.A25 .R36 2020 Blockchain in action / 2
QA76.9.A25 R36 2021 Building in Security at Agile Speed 1
QA76.9.A25 R37 2005 Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant / 1
QA76.9.A25 R37 2007 Linux firewalls / 1
QA76.9.A25 R37 2021 Cybersecurity and Third-Party Risk : Third Party Threat Hunting / 1
QA76.9.A25 R37 2024 Zero trust and third-party risk : reduce the blast radius / 2
QA76.9.A25 R38 2007 Open source fuzzing tools.
Open source fuzzing tools
3
QA76.9.A25 R4 2004 Biometrics for network security / 1
QA76.9.A25 R43 2013 Recent advances in information hiding and applications 1
QA76.9.A25 R438 2022 Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security / 1
QA76.9.A25 .R44 2015 Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition / 1
QA76.9.A25 R44 2020 Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage / 1
QA76.9.A25 R48 2008 Geekonomics : the real cost of insecure software / 1
QA76.9.A25 R49 2021 Art of attack : attacker mindset for security professionals. 3
QA76.9.A25 R53 2011eb Financial cryptography and data security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011 : revised selected papers / 1