Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 .E7323 2017 | Threat Level Red : Cybersecurity Research Programs of the U.S. Government / | 2 |
TK5105.59 .E77 2021 | The "essence" of network security : an end-to-end panorama / | 1 |
TK5105.59 .E83 1998 | Intrusion detection : network security beyond the firewall / | 1 |
TK5105.59 .E97 2006 |
EC2ND 2005 : proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK / EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis / |
2 |
TK5105.59 .E97 2006eb | EC2ND 2005 proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK / | 1 |
TK5105.59 .E97 2007 | Proceedings of the 3rd European Conference on Computer Network Defense | 1 |
TK5105.59 .E972 2006 | EC2ND 2006 : proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis / | 1 |
TK5105.59 .F33 2013 | Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers / | 1 |
TK5105.59 .F33 2017eb | Secure ICT service provisioning for cloud, mobile and beyond : ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers / | 1 |
TK5105.59 .F478 2006 | Firewall policies and VPN configurations / | 1 |
TK5105.59 .F53 2012 |
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response / Network intrusion analysis methodologies, tools, and techniques for incident analysis and response / |
3 |
TK5105.59 .F57 2006eb | Firewall policies and VPN configurations / | 4 |
TK5105.59 .F57 2019 | ||
TK5105.59 .F58 2012eb |
Information security governance simplified from the boardroom to the keyboard / Information security governance simplified : from the boardroom to the keyboard / |
4 |
TK5105.59 .F595 2023 | Fixing American cybersecurity : creating a strategic public-private partnership / | 1 |
TK5105.59 .F624 2021 | How to hack like a ghost : breaching the cloud / | 1 |
TK5105.59 .F65 2020 | Enterprise level security 2 : advanced topics in an uncertain world / | 1 |
TK5105.59 .F65 2021 | Enterprise level security / | 1 |
TK5105.59 .F67 2002eb | Absolute beginner's guide to personal firewalls / | 2 |
TK5105.59 .F675 2010 | Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance / | 2 |