|
|
QA76.9.A25 C79 2022
|
|
|
Cryptography and the intelligence community : the future of encryption / Committee on the Future of E
|
Bestseller
|
2022
|
|
QA76.9.A25 C846 2012eb
|
|
|
Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.
|
Bestseller
|
2012
|
|
QA76.9.A25 C9186 2017eb : Singapore Cyber-Security R&D Conference
|
|
|
A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R&D Conference
|
Bestseller
|
2017
|
|
QA76.9.A25 C925 2019eb
|
|
|
Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R
|
Bestseller
|
2020
|
Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R
|
Bestseller
|
2019
|
|
QA76.9.A25 C93 2004
|
|
|
Cyber war! / produced by Michael Kirk ; written and directed by Michael Kirk ; a Frontline coproducti
Moore Video:Available
|
Film
|
2003
|
|
QA76.9.A25 C93 2004eb
|
|
|
Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [et al. ; foreword by Je
|
Bestseller
|
2004
|
|
QA76.9.A25 C93 2013eb
|
|
|
Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hugh
|
Bestseller
|
2013
|
|
QA76.9.A25 C93 2014eb
|
|
|
Cyber resiliency, security, and cloud computing suitability in military information technology / Jess
|
Bestseller
|
2014
|
Cyber security and IT infrastructure protection / edited by John R. Vacca.
|
Bestseller
|
2014
|
|
QA76.9.A25 C93 2017
|
|
|
Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud
|
Bestseller
|
2017
|
|
QA76.9.A25 C93 2020evb : Gupta, C. P.,
|
|
|
Cybersecurity : a self-teaching introduction / C.P. Gupta, PhD & K.K. Goyal, PhD.
|
Bestseller
|
2020
|
|
QA76.9.A25 C93 2021eb : Auger, Gerald,
|
|
|
Cybersecurity career master plan : proven techniques and effective tips to help you advance in your c
|
Bestseller
|
2021
|
|
QA76.9.A25 C96 2020 : Schreider, Tari.
|
|
|
Cybersecurity Law, standards and regulations / Tari Schreider.
|
Bestseller
|
2020
|
|
QA76.9.A25 D335 2007eb : D'Arcy, John P.,
|
|
|
The misuse of information systems : the impact of security countermeasures / John P. D'Arcy.
|
Bestseller
|
2007
|
|
QA76.9.A25 D352 2013
|
|
|
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.
|
Bestseller
|
2013
|
|
QA76.9.A25 D45 1992 : DeMaio, Harry B.
|
|
|
Information protection and other unnatural acts : every manager's guide to keeping vital computer dat
Moore Stacks:Withdrawn, Moore Stacks:Available
|
Book
|
1992
|
|
QA76.9.A25 D465 2004eb : Dent, Alexander W.
|
|
|
User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell.
|
Bestseller
|
2004
|
|
QA76.9.A25 D66 2019eb : Donaldson, Scott E.,
|
|
|
Understanding security issues / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel.
|
Bestseller
|
2019
|
|
QA76.9.A25 D78 2010eb : Draief, Moez,
|
|
|
Epidemics and rumours in complex networks / Moez Draief, Laurent Massoulié.
|
Bestseller
|
2010
|
|
QA76.9.A25 D87 2008eb : Dunn Cavelty, Myriam.
|
|
|
Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty.
|
Bestseller
|
2008
|
|
QA76.9. A25 E34 2017eb : Edgar, Thomas W.,
|
|
|
Research methods for cyber security / Thomas W. Edgar, David O. Manz.
|
Bestseller
|
2017
|
|
QA76.9.A25 E467 2013eb
|
|
|
Emerging trends in ICT security / edited by Babak Akhgar, Hamid R. Arabnia.
|
Bestseller
|
2013
|
|
QA76.9.A25 E5425 2007eb
|
|
|
Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet
|
Bestseller
|
2007
|
|
QA76.9.A25 E5443 2013eb : Engebretson, Pat
|
|
|
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / P
|
Bestseller
|
2013
|
|
QA76.9.A25 E5455 2006
|
|
|
Enterprise information systems assurance and system security : managerial and technical issues / [edi
Moore Stacks:Available
|
Book
|
2006
|
|
QA76.9.A25 E737 2005eb : Erbschloe, Michael,
|
|
|
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er
|
Bestseller
|
2005
|
|
QA76.9.A25 E74 2004b : Erbschloe, Michael,
|
|
|
Implementing homeland security for enterprise IT / Michael Erbschloe.
|
Bestseller
|
2004
|
|
QA76.9.A25eb : Steinberg, Joseph
|
|
|
Cybersecurity / by Joseph Steinberg.
|
Bestseller
|
2020
|
|
QA76.9.A25 F33 2013 : Fadyushin, Vyacheslav.
|
|
|
Instant penetration testing : setting up a test lab how-to : set up your own penetration testing lab
|
Bestseller
|
2013
|
|
QA76.9.A25 F333 2013eb : Fabbri, Rosato.
|
|
|
Getting started with FortiGate : simplify and protect your network using the FortiGate network securi
|
Bestseller
|
2013
|
|
QA76.9.A25 F35 2005eb : Fair, Ted.
|
|
|
Cyber spying : tracking your family's (sometimes) secret online lives / Ted Fair, Michael Nordfelt, S
|
Bestseller
|
2005
|
|
QA76.9.A25 F47 2007eb : Ferraiolo, David.
|
|
|
Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
|
Bestseller
|
2007
|
|
QA76.9.A25 F525 2003eb
|
|
|
Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation
|
Bestseller
|
2003
|
|
QA76.9.A25 F654 2011
|
|
|
Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve
|
Bestseller
|
2011
|
|
QA76.9.A25 F67 2004eb : Foster, James C.
|
|
|
Programmer's ultimate security deskref / James C. Foster, Stephen C. Foster.
|
Bestseller
|
2004
|
|
QA76.9.A25 F67 2006eb : Foster, James C.
|
|
|
Writing security tools and exploits / James C. Foster, Vincent Liu.
|
Bestseller
|
2006
|
|
QA76.9.A25 F89 2018eb
|
|
|
Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Mill
|
Bestseller
|
2018
|
|
QA76.9.A25 G35 2020eb : Gamble, William.
|
|
|
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / William Gamble.
|
Bestseller
|
2020
|
|
QA76.9.A25 G37 2022eb : Garber, Leeza,
|
|
|
Can. Trust. Will : hiring for the human element in the new age of cybersecurity / Leeza Garber and Sc
|
Bestseller
|
2022
|
|
QA76.9.A25 G45 2007eb : Geisshirt, Kenneth.
|
|
|
Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers :
|
Bestseller
|
2007
|
|
QA76.9.A25 G63 2011 : Göbel, Jan Gerrit.
|
|
|
Client-Honeypots : Exploring Malicious Websites / by Jan Gerrit Göbel and Andreas Dewald ; with a for
|
Bestseller
|
2011
|
|
QA76.9.A25 G757 2018 : Grimes, Roger A.,
|
|
|
A data-driven computer security defense : THE computer security defense you should be using / Roger A
Moore Stacks:Available
|
Book
|
2018
|
|
QA76.9.A25 G85 2017eb
|
|
|
Guide to pairing-based cryptography / edited by Nadia El Mrabet, Marc Joye.
|
Bestseller
|
2017
|
|
QA76.9.A25 G87 2018 : Gupta, Rajneesh,
|
|
|
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS
|
Bestseller
|
2018
|
|
QA76.9.A25 H33 2001eb
|
|
|
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
|
Bestseller
|
2001
|
|
QA76.9.A25 H33 2002eb
|
|
|
Hack proofing ColdFusion / Greg Meyer [and others] ; Steven Casco, technical editor.
|
Bestseller
|
2002
|
|
QA76.9.A25 H334 2001eb
|
|
|
Hack proofing your e-commerce site : the only way to stop a hacker is to think like one].
|
Bestseller
|
2001
|
|
QA76.9.A25 H34 1992 : Hafner, Katie.
|
|
|
Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.
Moore Stacks:Available
|
Book
|
1992
|
|
QA76.9.A25 H35 2003eb : Rittinghouse, John W.
|
|
|
Cybersecurity operations handbook / John W. Rittinghouse, William M. Hancock.
|
Bestseller
|
2003
|
|
QA76.9.A25 H35 2016 : Halton, Wolf,
|
|
|
Kali Linux 2 / Wolf Halton, Bo Weaver.
|
Bestseller
|
2016
|
|
QA76.9.A25 H355 2010eb
|
|
|
Handbook of electronic security and digital forensics / edited by Hamid Jahankhani [and others].
|
Bestseller
|
2010
|
|