Call Number (LC) Title Results
QA76.9.A25 S38 2004eb Security assessment : case studies for implementing the NSA IAM /
Security assessment case studies for implementing the NSA IAM /
3
QA76.9.A25 .S384 2012 Metasploit Penetration Testing Cookbook. 2
QA76.9.A25 S4 1983 Security, IFIP/Sec'83 : proceedings of the First Security Conference, Stockholm, Sweden, 16-19 May 1983 / 1
QA76.9.A25 S42 2016eb Securing cyber-physical systems / 3
QA76.9.A25 S43 2003eb Security+ certification : exam guide /
Security : secrets, intruders and ID tags.
2
QA76.9.A25 S43 2009 Advances in security technology international conference, SecTech 2008, and its special sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers / 1
QA76.9.A25 S43 2010 Security technology, disaster recovery and business continuity : international conferences, SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings /
Security protocols : 15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
2
QA76.9.A25 S43 2011 Security technology international conference, SecTech 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings / 1
QA76.9.A25 S43 2012 Computer applications for security, control and system engineering : International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings / 1
QA76.9.A25 S43 2013 Secure multi-party computation /
Security for Linux on System z /
Security and privacy in biometrics
3
QA76.9.A25 S43 2013eb The secure information society ethical, legal and political challenges / 1
QA76.9.A25 S43 2016 Security, privacy, and applied cryptography engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / 1
QA76.9.A25 S43 2019 Security and privacy trends in the industrial internet of things / 1
QA76.9.A25 S43 2020 Security and trust management 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings /
Security and privacy in the Internet of Things : challenges and solutions /
2
QA76.9.A25 S43 2021 Security, privacy and data analytics : select proceedings of ISPDA 2021 / 1
QA76.9.A25 S43 2021eb Security and trust management : 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings / 1
QA76.9.A25 S43 2022 Securing social networks in cyberspace /
Security and resilience of control systems : theory and applications /
SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA
Security and artificial intelligence : a crossdisciplinary approach /
Security engineering for embedded and cyber-physical systems.
7
QA76.9.A25 S43 2023eb Security and trust management : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / 1
QA76.9.A25 S432 2010 Security for Web services and service-oriented architectures 1
QA76.9.A25 S434 2007 Security in distributed and networking systems / 1