Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Call numbers are:
Result page:  Prev Next  
Mark   Media Year
QA76.9.A25 C79 2022      
      Cryptography and the intelligence community : the future of encryption / Committee on the Future of E   Bestseller
BestsellerE-book
2022
QA76.9.A25 C846 2012eb      
      Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.   Bestseller
BestsellerE-book
2012
QA76.9.A25 C9186 2017eb : Singapore Cyber-Security R&D Conference     
      A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R&D Conference   Bestseller
BestsellerE-book
2017
QA76.9.A25 C925 2019eb    
      Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R   Bestseller
BestsellerE-book
2020
      Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and R   Bestseller
BestsellerE-book
2019
QA76.9.A25 C93 2004      
      Cyber war! / produced by Michael Kirk ; written and directed by Michael Kirk ; a Frontline coproducti Moore Video:Available   film
FilmVideorecording
2003
QA76.9.A25 C93 2004eb      
      Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [et al. ; foreword by Je   Bestseller
BestsellerE-book
2004
QA76.9.A25 C93 2013eb      
      Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hugh   Bestseller
BestsellerE-book
2013
QA76.9.A25 C93 2014eb    
      Cyber resiliency, security, and cloud computing suitability in military information technology / Jess   Bestseller
BestsellerE-book
2014
      Cyber security and IT infrastructure protection / edited by John R. Vacca.   Bestseller
BestsellerE-book
2014
QA76.9.A25 C93 2017      
      Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud   Bestseller
BestsellerE-book
2017
QA76.9.A25 C93 2020evb : Gupta, C. P.,     
      Cybersecurity : a self-teaching introduction / C.P. Gupta, PhD & K.K. Goyal, PhD.   Bestseller
BestsellerE-book
2020
QA76.9.A25 C93 2021eb : Auger, Gerald,     
      Cybersecurity career master plan : proven techniques and effective tips to help you advance in your c   Bestseller
BestsellerE-book
2021
QA76.9.A25 C96 2020 : Schreider, Tari.     
      Cybersecurity Law, standards and regulations / Tari Schreider.   Bestseller
BestsellerE-book
2020
QA76.9.A25 D335 2007eb : D'Arcy, John P.,     
      The misuse of information systems : the impact of security countermeasures / John P. D'Arcy.   Bestseller
BestsellerE-book
2007
QA76.9.A25 D352 2013      
      Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.   Bestseller
BestsellerE-book
2013
QA76.9.A25 D45 1992 : DeMaio, Harry B.     
      Information protection and other unnatural acts : every manager's guide to keeping vital computer dat Moore Stacks:Withdrawn, Moore Stacks:Available   book
BookPrinted Material
1992
QA76.9.A25 D465 2004eb : Dent, Alexander W.     
      User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell.   Bestseller
BestsellerE-book
2004
QA76.9.A25 D66 2019eb : Donaldson, Scott E.,     
      Understanding security issues / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel.   Bestseller
BestsellerE-book
2019
QA76.9.A25 D78 2010eb : Draief, Moez,     
      Epidemics and rumours in complex networks / Moez Draief, Laurent Massoulié.   Bestseller
BestsellerE-book
2010
QA76.9.A25 D87 2008eb : Dunn Cavelty, Myriam.     
      Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty.   Bestseller
BestsellerE-book
2008
QA76.9. A25 E34 2017eb : Edgar, Thomas W.,     
      Research methods for cyber security / Thomas W. Edgar, David O. Manz.   Bestseller
BestsellerE-book
2017
QA76.9.A25 E467 2013eb      
      Emerging trends in ICT security / edited by Babak Akhgar, Hamid R. Arabnia.   Bestseller
BestsellerE-book
2013
QA76.9.A25 E5425 2007eb      
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet   Bestseller
BestsellerE-book
2007
QA76.9.A25 E5443 2013eb : Engebretson, Pat     
      The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / P   Bestseller
BestsellerE-book
2013
QA76.9.A25 E5455 2006      
      Enterprise information systems assurance and system security : managerial and technical issues / [edi Moore Stacks:Available   book
BookPrinted Material
2006
QA76.9.A25 E737 2005eb : Erbschloe, Michael,     
      Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er   Bestseller
BestsellerE-book
2005
QA76.9.A25 E74 2004b : Erbschloe, Michael,     
      Implementing homeland security for enterprise IT / Michael Erbschloe.   Bestseller
BestsellerE-book
2004
QA76.9.A25eb : Steinberg, Joseph     
      Cybersecurity / by Joseph Steinberg.   Bestseller
BestsellerE-book
2020
QA76.9.A25 F33 2013 : Fadyushin, Vyacheslav.     
      Instant penetration testing : setting up a test lab how-to : set up your own penetration testing lab   Bestseller
BestsellerE-book
2013
QA76.9.A25 F333 2013eb : Fabbri, Rosato.     
      Getting started with FortiGate : simplify and protect your network using the FortiGate network securi   Bestseller
BestsellerE-book
2013
QA76.9.A25 F35 2005eb : Fair, Ted.     
      Cyber spying : tracking your family's (sometimes) secret online lives / Ted Fair, Michael Nordfelt, S   Bestseller
BestsellerE-book
2005
QA76.9.A25 F47 2007eb : Ferraiolo, David.     
      Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.   Bestseller
BestsellerE-book
2007
QA76.9.A25 F525 2003eb      
      Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation   Bestseller
BestsellerE-book
2003
QA76.9.A25 F654 2011      
      Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve   Bestseller
BestsellerE-book
2011
QA76.9.A25 F67 2004eb : Foster, James C.     
      Programmer's ultimate security deskref / James C. Foster, Stephen C. Foster.   Bestseller
BestsellerE-book
2004
QA76.9.A25 F67 2006eb : Foster, James C.     
      Writing security tools and exploits / James C. Foster, Vincent Liu.   Bestseller
BestsellerE-book
2006
QA76.9.A25 F89 2018eb      
      Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Mill   Bestseller
BestsellerE-book
2018
QA76.9.A25 G35 2020eb : Gamble, William.     
      The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / William Gamble.   Bestseller
BestsellerE-book
2020
QA76.9.A25 G37 2022eb : Garber, Leeza,     
      Can. Trust. Will : hiring for the human element in the new age of cybersecurity / Leeza Garber and Sc   Bestseller
BestsellerE-book
2022
QA76.9.A25 G45 2007eb : Geisshirt, Kenneth.     
      Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers :   Bestseller
BestsellerE-book
2007
QA76.9.A25 G63 2011 : Göbel, Jan Gerrit.     
      Client-Honeypots : Exploring Malicious Websites / by Jan Gerrit Göbel and Andreas Dewald ; with a for   Bestseller
BestsellerE-book
2011
QA76.9.A25 G757 2018 : Grimes, Roger A.,     
      A data-driven computer security defense : THE computer security defense you should be using / Roger A Moore Stacks:Available   book
BookPrinted Material
2018
QA76.9.A25 G85 2017eb      
      Guide to pairing-based cryptography / edited by Nadia El Mrabet, Marc Joye.   Bestseller
BestsellerE-book
2017
QA76.9.A25 G87 2018 : Gupta, Rajneesh,     
      Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS   Bestseller
BestsellerE-book
2018
QA76.9.A25 H33 2001eb      
      Hack proofing your Web applications : the only way to stop a hacker is to think like one.   Bestseller
BestsellerE-book
2001
QA76.9.A25 H33 2002eb      
      Hack proofing ColdFusion / Greg Meyer [and others] ; Steven Casco, technical editor.   Bestseller
BestsellerE-book
2002
QA76.9.A25 H334 2001eb      
      Hack proofing your e-commerce site : the only way to stop a hacker is to think like one].   Bestseller
BestsellerE-book
2001
QA76.9.A25 H34 1992 : Hafner, Katie.     
      Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff. Moore Stacks:Available   book
BookPrinted Material
1992
QA76.9.A25 H35 2003eb : Rittinghouse, John W.     
      Cybersecurity operations handbook / John W. Rittinghouse, William M. Hancock.   Bestseller
BestsellerE-book
2003
QA76.9.A25 H35 2016 : Halton, Wolf,     
      Kali Linux 2 / Wolf Halton, Bo Weaver.   Bestseller
BestsellerE-book
2016
QA76.9.A25 H355 2010eb      
      Handbook of electronic security and digital forensics / edited by Hamid Jahankhani [and others].   Bestseller
BestsellerE-book
2010
Resources
More Information
Result page:  Prev Next