Call Number (LC) Title Results
TK5105.59 .E7323 2017 Threat Level Red : Cybersecurity Research Programs of the U.S. Government / 2
TK5105.59 .E77 2021 The "essence" of network security : an end-to-end panorama / 1
TK5105.59 .E83 1998 Intrusion detection : network security beyond the firewall / 1
TK5105.59 .E97 2006 EC2ND 2005 : proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK /
EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis /
2
TK5105.59 .E97 2006eb EC2ND 2005 proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK / 1
TK5105.59 .E97 2007 Proceedings of the 3rd European Conference on Computer Network Defense 1
TK5105.59 .E972 2006 EC2ND 2006 : proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis / 1
TK5105.59 .F33 2013 Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers / 1
TK5105.59 .F33 2017eb Secure ICT service provisioning for cloud, mobile and beyond : ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers / 1
TK5105.59 .F478 2006 Firewall policies and VPN configurations / 1
TK5105.59 .F53 2012 Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response /
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response /
3
TK5105.59 .F57 2006eb Firewall policies and VPN configurations / 4
TK5105.59 .F57 2019  
TK5105.59 .F58 2012eb Information security governance simplified from the boardroom to the keyboard /
Information security governance simplified : from the boardroom to the keyboard /
4
TK5105.59 .F595 2023 Fixing American cybersecurity : creating a strategic public-private partnership / 1
TK5105.59 .F624 2021 How to hack like a ghost : breaching the cloud / 1
TK5105.59 .F65 2020 Enterprise level security 2 : advanced topics in an uncertain world / 1
TK5105.59 .F65 2021 Enterprise level security / 1
TK5105.59 .F67 2002eb Absolute beginner's guide to personal firewalls / 2
TK5105.59 .F675 2010 Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance / 2