Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Call numbers are:
Result page:  Prev Next  
Mark   Media Year
QA76.9.A25 J64 2006eb      
      Joe Grand's "best of" hardware, wireless & game console hacking : includes DVD with 20 hacks in high-   Bestseller
BestsellerE-book
2006
QA76.9.A25 J64 2016eb : Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext     
      Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed   Bestseller
BestsellerE-book
2016
QA76.9.A25 .J646 2015eb : Johns, A.     
      Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wir   Bestseller
BestsellerE-book
2015
QA76.9.A25 J67 2021 : Jordan, Ted,     
      CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations c   Bestseller
BestsellerE-book
2021
QA76.9.A25 K36 2021 : Katz, Jonathan,     
      Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell. Moore Stacks:Available   book
BookPrinted Material
2021
QA76.9.A25 .K384 2013eb : Krstevski, Vangel.     
      Hyper-V Replica Essentials : Ensure Business Continuity and Improve Your Disaster Recovery Policy Usi   Bestseller
BestsellerE-book
2013
QA76.9.A25 K45 2022eb : Kello, Lucas,     
      Striking back : the end of peace in cyberspace - and how to restore it / Lucas Kello.   Bestseller
BestsellerE-book
2022
QA76.9.A25 K536 2018eb : Kim, David     
      Fundamentals of information systems security / David Kim, Michael G. Solomon.   Bestseller
BestsellerE-book
2018
QA76.9.A25 K57 2000eb : Klosek, Jacqueline,     
      Data privacy in the information age / Jacqueline Klosek.   Bestseller
BestsellerE-book
2000
QA76.9.A25 K63 2010eb : Kocjan, Wojciech.     
      Tcl 8.5 network programming : build network-aware applications using Tcl, a powerful dynamic programm   Bestseller
BestsellerE-book
2010
QA76.9.A25 K68 2003eb : Kovacich, Gerald L.     
      The information systems security officer's guide : establishing and managing an information protectio   Bestseller
BestsellerE-book
2003
QA76.9.A25 K732 2013eb : Krausz, Michael.     
      The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.   Bestseller
BestsellerE-book
2013
QA76.9.A25 .K738 2014eb : Krausz, Michael,     
      Managing information security breaches : studies from real life / Michael Krausz.   Bestseller
BestsellerE-book
2014
QA76.9.A25 L384 2013 : Lantz, Brett,     
      Machine learning with R : learn how to use R to apply powerful machine learning methods and gain an i   Bestseller
BestsellerE-book
2013
QA76.9.A25 L485 2018eb : Lennon, Brian,     
      Passwords : philology, security, authentication / Brian Lennon.   Bestseller
BestsellerE-book
2018
QA76.9.A25 L64 2012eb : Loewengart, Victoria,     
      An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart.   Bestseller
BestsellerE-book
2012
QA76.9.A25 .L693 2019 : Lozano, Carlos A.     
      Hands-On Application Penetration Testing with Burp Suite : Use Burp Suite and Its Features to Inspect   Bestseller
BestsellerE-book
2019
QA76.9.A25 M31845 2014      
      Managing information security / edited by John R. Vacca.   Bestseller
BestsellerE-book
2014
QA76.9.A25 M33 2010eb : Maddock, Valerie.     
      IT induction and information security awareness : a pocket guide / Valerie Maddock.   Bestseller
BestsellerE-book
2010
QA76.9.A25 M33 2021 : MacMillan, Joseph.     
      Infosec strategies and best practices : gain proficiency in information security using expert-level s   Bestseller
BestsellerE-book
2021
QA76.9.A25 M37 2012eb : Martin, Keith M.     
      Everyday Cryptography : Fundamental Principles and Applications / Keith M. Martin.   Bestseller
BestsellerE-book
2012
QA76.9.A25 M37 2016eb : McPhee, Michael.     
      Penetration Testing with Raspberry Pi - Second Edition.   Bestseller
BestsellerE-book
2016
QA76.9.A25 M374 2008eb : Martin, Luther.     
      Introduction to identity-based encryption / Luther Martin.   Bestseller
BestsellerE-book
2008
QA76.9.A25 M393 2013eb : Mayoral, Fernando.     
      Instant Java password and authentication security : a practical, hands-on guide to securing Java appl   Bestseller
BestsellerE-book
2013
QA76.9.A25 M396 2007eb : Maynor, David.     
      Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David M   Bestseller
BestsellerE-book
2007
QA76.9.A25 .M443 2018 : Megahed, Hamza.     
      Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system v   Bestseller
BestsellerE-book
2018
QA76.9.A25 M457 2007 : Mendell, Ronald L.     
      Document Security : Protecting Physical and Electronic Content.   Bestseller
BestsellerE-book
2007
QA76.9.A25 M55 2001eb : Miles, Wyman.     
      Hack proofing Sun Solaris 8 / Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical edit   Bestseller
BestsellerE-book
2001
QA76.9.A25 M563 2007eb      
      Microsoft Vista for IT security professionals / Anthony Piltzecker, technical editor ; Larry Chaffin   Bestseller
BestsellerE-book
2007
QA76.9.A25 .M582 2009 : Mischel, Magnus.     
      ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application ha   Bestseller
BestsellerE-book
2009
QA76.9.A25 N275 2007eb      
      National security / edited by H. Chen [and others].   Bestseller
BestsellerE-book
2007
QA76.9.A25 N28 2007eb : NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area     
      A process for developing a common vocabulary in the information security area / edited by Jan von Kno   Bestseller
BestsellerE-book
2007
QA76.9.A25 N35 2019 : Najera-Gutierrez, Gilberto,     
      Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Lin   Bestseller
BestsellerE-book
2019
QA76.9.A25 N37 2018 : National Academies of Sciences, Engineering, and Medicine (U.S.).     
      Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and   Bestseller
BestsellerE-book
2018
QA76.9.A25 N373 2010 ebook : National Research Council (U.S.).     
      Toward better usability, security, and privacy of information technology : report of a workshop / Ste   Bestseller
BestsellerE-book
2010
QA76.9.A25 N3753 2006eb : NATO Advanced Research Workshop on Information Assurance and Computer Security     
      Information assurance and computer security / edited by Johnson P. Thomas and Mohamed Essaaidi.   Bestseller
BestsellerE-book
2006
QA76.9.A25 N3754 2007eb : NATO Advanced Study Institute on Formal Logical Methods for System Security and Correctness     
      Formal logical methods for system security and correctness / edited by Orna Grumberg, Tobias Nipkow a   Bestseller
BestsellerE-book
2008
QA76.9.A25 N378 2006eb : NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects     
      Secure telematic applications for national scale projects / edited by Jean-Guy Fontaine and Mikhail M   Bestseller
BestsellerE-book
2008
QA76.9.A25 N38 2004eb : Nazario, Jose.     
      Defense and detection strategies against Internet worms / Jose Nazario.   Bestseller
BestsellerE-book
2004
QA76.9.A25 N38 2017eb : National Academies of Sciences, Engineering, and Medicine (U.S.).     
      Foundational cybersecurity research : improving science, engineering, and institutions / Lynette I. M   Bestseller
BestsellerE-book
2015
QA76.9.A25 N384 2013 : Neeraj, Nishant.     
      Mastering Apache Cassandra : get comfortable with the fastest NoSQL database, its architecture, key p   Bestseller
BestsellerE-book
2013
QA76.9.A25 N63 2003eb : Noble, Jim.     
      Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others]   Bestseller
BestsellerE-book
2003
QA76.9.A25 .N653 2014 : Nolan, Catherine.     
      The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashl   Bestseller
BestsellerE-book
2014
QA76.9.A25 O67 2003eb : Oppliger, Rolf.     
      Security technologies for the World Wide Web / Rolf Oppliger.   Bestseller
BestsellerE-book
2003
QA76.9.A25 O67 2021 : Oppliger, Rolf,     
      Cryptography 101 : from theory to practice / Rolf Oppliger.   Bestseller
BestsellerE-book
2021
QA76.9.A25 O83 2006eb : Osborne, Mark     
      How to cheat at managing information security / Mark Osborne ; Paul M. Summitt, technical editor.   Bestseller
BestsellerE-book
2006
QA76.9.A25 O95 2021 : Ozkaya, Erdal.     
      Incident Response in the Age of Cloud : Techniques and Best Practices to Effectively Respond to Cyber   Bestseller
BestsellerE-book
2021
QA76.9.A25 O95 2022 : Ozkaya, Erdal,     
      Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cyberse   Bestseller
BestsellerE-book
2022
QA76.9.A25 P37 2019 : Parisi, Alessandro,     
      Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber   Bestseller
BestsellerE-book
2019
QA76.9.A25 P414 2007eb      
      PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor   Bestseller
BestsellerE-book
2007
Resources
More Information
Result page:  Prev Next