Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 T48 2022 | Secure data science : integrating cyber security and data science / | 1 |
QA76.9.A25 T53 2000 | Fundamentals of cryptology : a professional reference and interactive tutorial / | 1 |
QA76.9.A25 T53 2002eb |
Fundamentals of cryptology : a professional reference and interactive tutorial / Fundamentals of cryptology a professional reference and interactive tutorial / |
2 |
QA76.9.A25 T55 2022eb | The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more / | 2 |
QA76.9.A25 T56 2012 |
CISO's guide to penetration testing a framework to plan, manage, and maximize benefits / CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / |
3 |
QA76.9.A25 T57 2005eb | PC magazine fighting spyware, viruses, and malware / | 1 |
QA76.9.A25 T58 2004eb | CISSP : Certified Information Systems Security Professional study guide / | 1 |
QA76.9.A25 T63 2001eb |
Hack proofing Windows 2000 / Hack proofing Windows 2000 |
2 |
QA76.9.A25 T67 2009 | Topics in cryptology - CT-RSA 2009 the cryptographers' track at the RSA conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings / | 1 |
QA76.9.A25 T68 2022 | Towards an increased security : green innovations, intellectual property protection and information security / | 1 |
QA76.9.A25 T69 2023i | Towards a More Stable and Secure ICT Environment: Unpacking Inter-State Cooperation conference summary report. | 1 |
QA76.9.A25 T695 2007 | Toward a safer and more secure cyberspace / | 1 |
QA76.9.A25 T695 2007eb | Toward a safer and more secure cyberspace / | 2 |
QA76.9.A25 T72 2008eb | SonicWALL secure wireless network integrated solutions guide / | 1 |
QA76.9.A25 T727 2021 | Transdisciplinary perspectives on risk management and cyber intelligence / | 1 |
QA76.9.A25 T73 2009 | Transactions on computational science IV special issue on security in computing / | 1 |
QA76.9.A25 T73 2010 |
Transactions on data hiding and multimedia security V Transactions on computational science X special issue on security in computing. Transactions on computational science XI special issue on security in computing. |
3 |
QA76.9.A25 T73 2011 | Transactions on data hiding and multimedia security VI | 1 |
QA76.9.A25 T73 2013eb | Transforming cybersecurity : using COBIT 5 / | 1 |
QA76.9.A25 T73 2015eb | Transactions on data hiding and multimedia security X / | 1 |