|
|
QA76.9.A25 A873 2007eb
|
|
|
AVIEN malware defense guide for the Enterprise / David Harley [and others] ; foreword by Robert S. Vi
|
Bestseller
|
2007
|
|
QA76.9.A25 A88 2004eb : Axelrod, C. Warren.
|
|
|
Outsourcing information security / C. Warren Axelrod.
|
Bestseller
|
2004
|
|
QA76.9.A25 .A884 2014eb
|
|
|
At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma
|
Bestseller
|
2014
|
|
QA76.9.A25 B35 2013eb : Balapure, Aditya,
|
|
|
Learning metasploit exploitation and development / Aditya Balapure.
|
Bestseller
|
2013
|
|
QA76.9.A25 B384 2013 : Bauer, Craig P.,
|
|
|
Secret history : the story of cryptology / Craig P. Bauer, York College of Pennsylvania and National
Moore Stacks:Available
|
Book
|
2013
|
|
QA76.9.A25 .B384 2014 : Bolander, Brian ""Bo""
|
|
|
VSphere Design Best Practices.
|
Bestseller
|
2014
|
|
QA76.9.A25 B39 2005eb : Bayles, Aaron W.
|
|
|
InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles and others ; forward by Ch
|
Bestseller
|
2005
|
|
QA76.9.A25 B43 2012eb : Beachy, Rob.
|
|
|
End user information security policy template / by Rob Beachy.
|
Bestseller
|
2012
|
|
QA76.9.A25 B444 2014 : Beggs, Robert W.
|
|
|
Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's s
|
Bestseller
|
2014
|
|
QA76.9.A25 B45 2005eb : Ben-Natan, Ron.
|
|
|
Implementing database security and auditing : a guide for DBAs, information security administrators a
|
Bestseller
|
2005
|
|
QA76.9.A25 B46 2012eb : Ben-Ari, Erez.
|
|
|
Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customiz
|
Bestseller
|
2012
|
|
QA76.9.A25 B486 2007eb
|
|
|
The best damn IT security management book period / Bryan Cunningham [and others].
|
Bestseller
|
2007
|
|
QA76.9.A25 B534 2002eb : Bidwell, Teri.
|
|
|
Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidw
|
Bestseller
|
2002
|
|
QA76.9.A25 B57 1999eb : Blake, Ian F.
|
|
|
Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart.
|
Bestseller
|
1999
|
|
QA76.9.A25 B63 2021 : Bock, Lisa,
|
|
|
Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better
|
Bestseller
|
2021
|
|
QA76.9.A25 B67 2019eb : Borso, Serge,
|
|
|
The penetration tester's guide to web applications / Serge Borso
|
Bestseller
|
2019
|
|
QA76.9.A25 B67 2021 : Borges, Dan.
|
|
|
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict / Dan
|
Bestseller
|
2021
|
|
QA76.9.A25 B73 2006eb : Bradley, Tony,
|
|
|
Essential computer security : everyone's guide to e-mail, internet, and wireless security / Tony Brad
|
Bestseller
|
2006
|
|
QA76.9.A25 B73 2020eb : Bray, Shannon,
|
|
|
Implementing cryptography using Python / Shannon W. Bray.
|
Bestseller
|
2020
|
|
QA76.9.A25 B76 2020eb : Brown, Steven,
|
|
|
Successful cybersecurity professionals : how to change your behavior to protect your organization / D
|
Bestseller
|
2020
|
|
QA76.9.A25 B823 2020eb : Buchanan, Ben
|
|
|
The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan.
|
Bestseller
|
2020
|
|
QA76.9.A25 B83 2017 : Buchanan, William,
|
|
|
Cryptography / William J. Buchanan, OBE.
|
Bestseller
|
2017
|
|
Faculty QA76.9.A25 B84 2002b : Buege, Brian.
|
|
|
Hacking exposed J2EE & Java : developing secure applications with Java technology / Brian Buege, Rand
Moore Rider Faculty Publications Collection:Available
|
Book
|
2002
|
|
QA76.9.A25 B84 2005eb
|
|
|
Buffer overflow attacks : detect, exploit, prevent / James C. Foster [and others] ; foreword by Dave
|
Bestseller
|
2005
|
|
QA76.9.A25 B875 2006eb : Burnett, Mark
|
|
|
Perfect passwords : selection, protection, authentication / Mark Burnett ; Dave Kleiman, technical ed
|
Bestseller
|
2006
|
|
QA76.9.A25 B875 2019eb : Burkart, Patrick,
|
|
|
Why hackers win : power and disruption in the network society / Patrick Burkart and Tom McCourt.
|
Bestseller
|
2019
|
|
QA76.9.A25 C348 2004eb : Caloyannides, Michael A.
|
|
|
Privacy protection and computer forensics / Michael A. Caloyannides.
|
Bestseller
|
2004
|
|
QA76.9.A25 C35 2020 : Calder, Alan,
|
|
|
The cyber security handbook prepare for, respond to and recover from cyber attacks / Alan Calder.
|
Bestseller
|
2020
|
|
QA76.9.A25 .C353 2017 : Calder, Alan,
|
|
|
ISO27001/ISO27002 : un guide de poche / Alan Calder.
|
Bestseller
|
2017
|
|
QA76.9.A25 .C443 2018eb : Chebbi, Chiheb.
|
|
|
Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient atta
|
Bestseller
|
2018
|
|
QA76.9.A25 C47 2017 : Bondavalli, Andrea.
|
|
|
Certifications of Critical Systems - The CECRIS Experience.
|
Bestseller
|
2017
|
|
QA76.9.A25 C542 2012eb : Clarke, Justin.
|
|
|
SQL injection attacks and defense / Justin Clarke.
|
Bestseller
|
2012
|
|
QA76.9.A25 C547 2007eb : Clercq, Jan de,
|
|
|
Microsoft windows security fundamentals / Jan De Clercq, Guido Grillenmeier.
|
Bestseller
|
2007
|
|
QA76.9.A25 C627 2013eb
|
|
|
Computer and information security handbook / edited by John R. Vacca.
|
Bestseller
|
2013
|
|
QA76.9.A25 C627 2017
|
|
|
Computer and information security handbook / edited by John R. Vacca.
|
Bestseller
|
2017
|
|
QA76.9.A25 C628 2003eb
|
|
|
Computer and intrusion forensics / George Mohay [and others].
|
Bestseller
|
2003
|
|
QA76.9.A25 .C66 2009eb
|
|
|
Computer and information security handbook / edited by John R. Vacca.
|
Bestseller
|
2009
|
|
QA76.9.A25 C6663 1990eb
|
|
|
Computers at risk : safe computing in the information age / System Security Study Committee, Computer
|
Bestseller
|
1991
|
|
QA76.9.A25 C6678 2009 : Conti, Greg.
|
|
|
Googling security : how much does Google know about you? / Greg Conti.
Moore Stacks:Available
|
Book
|
2009
|
|
QA76.9.A25 C68 2008eb
|
|
|
Digital watermarking and steganography / Ingemar J. Cox [and others].
|
Bestseller
|
2008
|
|
QA76.9.A25 C75 2003eb
|
|
|
Critical information infrastructure protection and the law : an overview of key issues / Stewart D. P
|
Bestseller
|
2003
|
|
QA76.9.A25 C79 2022
|
|
|
Cryptography and the intelligence community : the future of encryption / Committee on the Future of E
|
Bestseller
|
2022
|
|
QA76.9.A25 C846 2012eb
|
|
|
Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.
|
Bestseller
|
2012
|
|
QA76.9.A25 C9186 2017eb : Singapore Cyber-Security R&D Conference
|
|
|
A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R&D Conference
|
Bestseller
|
2017
|
|
QA76.9.A25 C925 2019eb
|
|
|
Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R
|
Bestseller
|
2020
|
Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R
|
Bestseller
|
2019
|
|
QA76.9.A25 C93 2004
|
|
|
Cyber war! / produced by Michael Kirk ; written and directed by Michael Kirk ; a Frontline coproducti
Moore Video:Available
|
Film
|
2003
|
|
QA76.9.A25 C93 2004eb
|
|
|
Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [et al. ; foreword by Je
|
Bestseller
|
2004
|
|
QA76.9.A25 C93 2013eb
|
|
|
Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hugh
|
Bestseller
|
2013
|
|
QA76.9.A25 C93 2014eb
|
|
|
Cyber resiliency, security, and cloud computing suitability in military information technology / Jess
|
Bestseller
|
2014
|
Cyber security and IT infrastructure protection / edited by John R. Vacca.
|
Bestseller
|
2014
|
|
QA76.9.A25 C93 2017
|
|
|
Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud
|
Bestseller
|
2017
|
|