Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Call numbers are:
Result page:  Prev Next  
Mark   Media Year
QA76.9.A25 A873 2007eb      
      AVIEN malware defense guide for the Enterprise / David Harley [and others] ; foreword by Robert S. Vi   Bestseller
BestsellerE-book
2007
QA76.9.A25 A88 2004eb : Axelrod, C. Warren.     
      Outsourcing information security / C. Warren Axelrod.   Bestseller
BestsellerE-book
2004
QA76.9.A25 .A884 2014eb      
      At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma   Bestseller
BestsellerE-book
2014
QA76.9.A25 B35 2013eb : Balapure, Aditya,     
      Learning metasploit exploitation and development / Aditya Balapure.   Bestseller
BestsellerE-book
2013
QA76.9.A25 B384 2013 : Bauer, Craig P.,     
      Secret history : the story of cryptology / Craig P. Bauer, York College of Pennsylvania and National Moore Stacks:Available   book
BookPrinted Material
2013
QA76.9.A25 .B384 2014 : Bolander, Brian ""Bo""     
      VSphere Design Best Practices.   Bestseller
BestsellerE-book
2014
QA76.9.A25 B39 2005eb : Bayles, Aaron W.     
      InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles and others ; forward by Ch   Bestseller
BestsellerE-book
2005
QA76.9.A25 B43 2012eb : Beachy, Rob.     
      End user information security policy template / by Rob Beachy.   Bestseller
BestsellerE-book
2012
QA76.9.A25 B444 2014 : Beggs, Robert W.     
      Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's s   Bestseller
BestsellerE-book
2014
QA76.9.A25 B45 2005eb : Ben-Natan, Ron.     
      Implementing database security and auditing : a guide for DBAs, information security administrators a   Bestseller
BestsellerE-book
2005
QA76.9.A25 B46 2012eb : Ben-Ari, Erez.     
      Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customiz   Bestseller
BestsellerE-book
2012
QA76.9.A25 B486 2007eb      
      The best damn IT security management book period / Bryan Cunningham [and others].   Bestseller
BestsellerE-book
2007
QA76.9.A25 B534 2002eb : Bidwell, Teri.     
      Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidw   Bestseller
BestsellerE-book
2002
QA76.9.A25 B57 1999eb : Blake, Ian F.     
      Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart.   Bestseller
BestsellerE-book
1999
QA76.9.A25 B63 2021 : Bock, Lisa,     
      Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better   Bestseller
BestsellerE-book
2021
QA76.9.A25 B67 2019eb : Borso, Serge,     
      The penetration tester's guide to web applications / Serge Borso   Bestseller
BestsellerE-book
2019
QA76.9.A25 B67 2021 : Borges, Dan.     
      Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict / Dan   Bestseller
BestsellerE-book
2021
QA76.9.A25 B73 2006eb : Bradley, Tony,     
      Essential computer security : everyone's guide to e-mail, internet, and wireless security / Tony Brad   Bestseller
BestsellerE-book
2006
QA76.9.A25 B73 2020eb : Bray, Shannon,     
      Implementing cryptography using Python / Shannon W. Bray.   Bestseller
BestsellerE-book
2020
QA76.9.A25 B76 2020eb : Brown, Steven,     
      Successful cybersecurity professionals : how to change your behavior to protect your organization / D   Bestseller
BestsellerE-book
2020
QA76.9.A25 B823 2020eb : Buchanan, Ben     
      The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan.   Bestseller
BestsellerE-book
2020
QA76.9.A25 B83 2017 : Buchanan, William,     
      Cryptography / William J. Buchanan, OBE.   Bestseller
BestsellerE-book
2017
Faculty QA76.9.A25 B84 2002b : Buege, Brian.     
      Hacking exposed J2EE & Java : developing secure applications with Java technology / Brian Buege, Rand Moore Rider Faculty Publications Collection:Available   book
BookPrinted Material
2002
QA76.9.A25 B84 2005eb      
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster [and others] ; foreword by Dave   Bestseller
BestsellerE-book
2005
QA76.9.A25 B875 2006eb : Burnett, Mark     
      Perfect passwords : selection, protection, authentication / Mark Burnett ; Dave Kleiman, technical ed   Bestseller
BestsellerE-book
2006
QA76.9.A25 B875 2019eb : Burkart, Patrick,     
      Why hackers win : power and disruption in the network society / Patrick Burkart and Tom McCourt.   Bestseller
BestsellerE-book
2019
QA76.9.A25 C348 2004eb : Caloyannides, Michael A.     
      Privacy protection and computer forensics / Michael A. Caloyannides.   Bestseller
BestsellerE-book
2004
QA76.9.A25 C35 2020 : Calder, Alan,     
      The cyber security handbook prepare for, respond to and recover from cyber attacks / Alan Calder.   Bestseller
BestsellerE-book
2020
QA76.9.A25 .C353 2017 : Calder, Alan,     
      ISO27001/ISO27002 : un guide de poche / Alan Calder.   Bestseller
BestsellerE-book
2017
QA76.9.A25 .C443 2018eb : Chebbi, Chiheb.     
      Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient atta   Bestseller
BestsellerE-book
2018
QA76.9.A25 C47 2017 : Bondavalli, Andrea.     
      Certifications of Critical Systems - The CECRIS Experience.   Bestseller
BestsellerE-book
2017
QA76.9.A25 C542 2012eb : Clarke, Justin.     
      SQL injection attacks and defense / Justin Clarke.   Bestseller
BestsellerE-book
2012
QA76.9.A25 C547 2007eb : Clercq, Jan de,     
      Microsoft windows security fundamentals / Jan De Clercq, Guido Grillenmeier.   Bestseller
BestsellerE-book
2007
QA76.9.A25 C627 2013eb      
      Computer and information security handbook / edited by John R. Vacca.   Bestseller
BestsellerE-book
2013
QA76.9.A25 C627 2017      
      Computer and information security handbook / edited by John R. Vacca.   Bestseller
BestsellerE-book
2017
QA76.9.A25 C628 2003eb      
      Computer and intrusion forensics / George Mohay [and others].   Bestseller
BestsellerE-book
2003
QA76.9.A25 .C66 2009eb      
      Computer and information security handbook / edited by John R. Vacca.   Bestseller
BestsellerE-book
2009
QA76.9.A25 C6663 1990eb      
      Computers at risk : safe computing in the information age / System Security Study Committee, Computer   Bestseller
BestsellerE-book
1991
QA76.9.A25 C6678 2009 : Conti, Greg.     
      Googling security : how much does Google know about you? / Greg Conti. Moore Stacks:Available   book
BookPrinted Material
2009
QA76.9.A25 C68 2008eb      
      Digital watermarking and steganography / Ingemar J. Cox [and others].   Bestseller
BestsellerE-book
2008
QA76.9.A25 C75 2003eb      
      Critical information infrastructure protection and the law : an overview of key issues / Stewart D. P   Bestseller
BestsellerE-book
2003
QA76.9.A25 C79 2022      
      Cryptography and the intelligence community : the future of encryption / Committee on the Future of E   Bestseller
BestsellerE-book
2022
QA76.9.A25 C846 2012eb      
      Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.   Bestseller
BestsellerE-book
2012
QA76.9.A25 C9186 2017eb : Singapore Cyber-Security R&D Conference     
      A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R&D Conference   Bestseller
BestsellerE-book
2017
QA76.9.A25 C925 2019eb    
      Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R   Bestseller
BestsellerE-book
2020
      Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R   Bestseller
BestsellerE-book
2019
QA76.9.A25 C93 2004      
      Cyber war! / produced by Michael Kirk ; written and directed by Michael Kirk ; a Frontline coproducti Moore Video:Available   film
FilmVideorecording
2003
QA76.9.A25 C93 2004eb      
      Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [et al. ; foreword by Je   Bestseller
BestsellerE-book
2004
QA76.9.A25 C93 2013eb      
      Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hugh   Bestseller
BestsellerE-book
2013
QA76.9.A25 C93 2014eb    
      Cyber resiliency, security, and cloud computing suitability in military information technology / Jess   Bestseller
BestsellerE-book
2014
      Cyber security and IT infrastructure protection / edited by John R. Vacca.   Bestseller
BestsellerE-book
2014
QA76.9.A25 C93 2017      
      Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud   Bestseller
BestsellerE-book
2017
Resources
More Information
Result page:  Prev Next