Call Number (LC) Title Results
QA76.9.A25 T48 2022 Secure data science : integrating cyber security and data science / 1
QA76.9.A25 T53 2000 Fundamentals of cryptology : a professional reference and interactive tutorial / 1
QA76.9.A25 T53 2002eb Fundamentals of cryptology : a professional reference and interactive tutorial /
Fundamentals of cryptology a professional reference and interactive tutorial /
2
QA76.9.A25 T55 2022eb The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more / 2
QA76.9.A25 T56 2012 CISO's guide to penetration testing a framework to plan, manage, and maximize benefits /
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits /
3
QA76.9.A25 T57 2005eb PC magazine fighting spyware, viruses, and malware / 1
QA76.9.A25 T58 2004eb CISSP : Certified Information Systems Security Professional study guide / 1
QA76.9.A25 T63 2001eb Hack proofing Windows 2000 /
Hack proofing Windows 2000
2
QA76.9.A25 T67 2009 Topics in cryptology - CT-RSA 2009 the cryptographers' track at the RSA conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings / 1
QA76.9.A25 T68 2022 Towards an increased security : green innovations, intellectual property protection and information security / 1
QA76.9.A25 T69 2023i Towards a More Stable and Secure ICT Environment: Unpacking Inter-State Cooperation conference summary report. 1
QA76.9.A25 T695 2007 Toward a safer and more secure cyberspace / 1
QA76.9.A25 T695 2007eb Toward a safer and more secure cyberspace / 2
QA76.9.A25 T72 2008eb SonicWALL secure wireless network integrated solutions guide / 1
QA76.9.A25 T727 2021 Transdisciplinary perspectives on risk management and cyber intelligence / 1
QA76.9.A25 T73 2009 Transactions on computational science IV special issue on security in computing / 1
QA76.9.A25 T73 2010 Transactions on data hiding and multimedia security V
Transactions on computational science X special issue on security in computing.
Transactions on computational science XI special issue on security in computing.
3
QA76.9.A25 T73 2011 Transactions on data hiding and multimedia security VI 1
QA76.9.A25 T73 2013eb Transforming cybersecurity : using COBIT 5 / 1
QA76.9.A25 T73 2015eb Transactions on data hiding and multimedia security X / 1