Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 .M84 2003eb | .NET development security solutions / | 1 |
TK5105.59 .M854 2018 | Network security and cryptography : a self-teaching introduction / | 2 |
TK5105.59 .M865 2013 | Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / | 2 |
TK5105.59 .M88 2011 |
Preventing good people from doing bad things : implementing least privilege / Preventing good people from doing bad things implementing least privilege / |
3 |
TK5105.59 .N33 2005eb | Network security evaluation using the NSA IEM | 1 |
TK5105.59 .N3365 2013 | Network attacks and defenses : a hands-on approach / | 2 |
TK5105.59 .N338 2008 | Network security : know it all / | 1 |
TK5105.59 .N338 2008eb | Network security know it all / | 1 |
TK5105.59 .N34 | Newsletter / | 1 |
TK5105.59 .N3464 2017 | New solutions for cybersecurity / | 1 |
TK5105.59 .N3464 2018eb | New solutions for cybersecurity / | 2 |
TK5105.59 .N35 2004 | Intrusion detection in distributed systems : an abstraction-based approach / | 1 |
TK5105.59 .N35 2023 | Wireshark for network forensics : an essential guide for IT and cloud professionals / | 3 |
TK5105.59 .N38 2011 | Use of risk analysis in computer-aided persuasion / | 1 |
TK5105.59 .N38 2018eb | Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures / | 1 |
TK5105.59 .N45 2005eb | Integrated Security Systems Design : Concepts, Specifications, and Implementation. | 1 |
TK5105.59 .N45 2007 | Integrated security systems design : concepts, specifications, and implementation / | 1 |
TK5105.59 .N45 2007eb |
Integrated security systems design : concepts, specifications, and implementation / Integrated security systems design concepts, specifications, and implementation / |
2 |
TK5105.59 .N475 2001 | ||
TK5105.59 .N475 2003 | Network Intrusion Detection, Third Edition / | 1 |