Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 .F68 2003 | Programming .NET security / | 1 |
TK5105.59 .F68 2011 | Foundations of security analysis and design VI FOSAD tutorial lectures / | 1 |
TK5105.59 .F68 2016eb | Data breach preparation and response : breaches are certain, impact is not / | 2 |
TK5105.59 .F73 2014 | Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services / | 1 |
TK5105.59 .F74 1998eb | Protecting networks with SATAN / | 1 |
TK5105.59 .F79 2009 | Security monitoring / | 3 |
TK5105.59 F79 2012 | Monitoring i bezpieczeństwo sieci / | 1 |
TK5105.59 .F811 2006eb | Cisco ASA : all-in-one firewall, IPS, and VPN adaptive security appliance / | 1 |
TK5105.59 .F85 2005eb | Network security evaluation : using the NSA IEM / | 1 |
TK5105.59 .F86 2005 | Network security technologies | 2 |
TK5105.59 .F88 2012 | Future security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings / | 1 |
TK5105.59 .G3 2003eb | Practical UNIX and Internet security / | 1 |
TK5105.59 .G347 2008 | Cyber security : economic strategies and public policy alternatives / | 1 |
TK5105.59 .G353 2021 | Game theory and machine learning for cyber security / | 1 |
TK5105.59 .G36 2012 |
Network and application security fundamentals and practices Decision and Game Theory for Security : Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings / |
2 |
TK5105.59 .G36 2013 | Decision and game theory for security : 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings / | 1 |
TK5105.59 .G37 1997 | Web security & commerce / | 1 |
TK5105.59 .G37 2002 | Web security, privacy and commerce / | 1 |
TK5105.59 .G375 2003 | Kerberos : the definitive guide / | 2 |
TK5105.59 .G38 1996 | Practical UNIX and Internet security / | 1 |