|
|
QA76.9.A25 J64 2006eb
|
|
|
Joe Grand's "best of" hardware, wireless & game console hacking : includes DVD with 20 hacks in high-
|
Bestseller
|
2006
|
|
QA76.9.A25 J64 2016eb : Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext
|
|
|
Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed
|
Bestseller
|
2016
|
|
QA76.9.A25 .J646 2015eb : Johns, A.
|
|
|
Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wir
|
Bestseller
|
2015
|
|
QA76.9.A25 J67 2021 : Jordan, Ted,
|
|
|
CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations c
|
Bestseller
|
2021
|
|
QA76.9.A25 K36 2021 : Katz, Jonathan,
|
|
|
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.
Moore Stacks:Available
|
Book
|
2021
|
|
QA76.9.A25 .K384 2013eb : Krstevski, Vangel.
|
|
|
Hyper-V Replica Essentials : Ensure Business Continuity and Improve Your Disaster Recovery Policy Usi
|
Bestseller
|
2013
|
|
QA76.9.A25 K45 2022eb : Kello, Lucas,
|
|
|
Striking back : the end of peace in cyberspace - and how to restore it / Lucas Kello.
|
Bestseller
|
2022
|
|
QA76.9.A25 K536 2018eb : Kim, David
|
|
|
Fundamentals of information systems security / David Kim, Michael G. Solomon.
|
Bestseller
|
2018
|
|
QA76.9.A25 K57 2000eb : Klosek, Jacqueline,
|
|
|
Data privacy in the information age / Jacqueline Klosek.
|
Bestseller
|
2000
|
|
QA76.9.A25 K63 2010eb : Kocjan, Wojciech.
|
|
|
Tcl 8.5 network programming : build network-aware applications using Tcl, a powerful dynamic programm
|
Bestseller
|
2010
|
|
QA76.9.A25 K68 2003eb : Kovacich, Gerald L.
|
|
|
The information systems security officer's guide : establishing and managing an information protectio
|
Bestseller
|
2003
|
|
QA76.9.A25 K732 2013eb : Krausz, Michael.
|
|
|
The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.
|
Bestseller
|
2013
|
|
QA76.9.A25 .K738 2014eb : Krausz, Michael,
|
|
|
Managing information security breaches : studies from real life / Michael Krausz.
|
Bestseller
|
2014
|
|
QA76.9.A25 L384 2013 : Lantz, Brett,
|
|
|
Machine learning with R : learn how to use R to apply powerful machine learning methods and gain an i
|
Bestseller
|
2013
|
|
QA76.9.A25 L485 2018eb : Lennon, Brian,
|
|
|
Passwords : philology, security, authentication / Brian Lennon.
|
Bestseller
|
2018
|
|
QA76.9.A25 L64 2012eb : Loewengart, Victoria,
|
|
|
An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart.
|
Bestseller
|
2012
|
|
QA76.9.A25 .L693 2019 : Lozano, Carlos A.
|
|
|
Hands-On Application Penetration Testing with Burp Suite : Use Burp Suite and Its Features to Inspect
|
Bestseller
|
2019
|
|
QA76.9.A25 M31845 2014
|
|
|
Managing information security / edited by John R. Vacca.
|
Bestseller
|
2014
|
|
QA76.9.A25 M33 2010eb : Maddock, Valerie.
|
|
|
IT induction and information security awareness : a pocket guide / Valerie Maddock.
|
Bestseller
|
2010
|
|
QA76.9.A25 M33 2021 : MacMillan, Joseph.
|
|
|
Infosec strategies and best practices : gain proficiency in information security using expert-level s
|
Bestseller
|
2021
|
|
QA76.9.A25 M37 2012eb : Martin, Keith M.
|
|
|
Everyday Cryptography : Fundamental Principles and Applications / Keith M. Martin.
|
Bestseller
|
2012
|
|
QA76.9.A25 M37 2016eb : McPhee, Michael.
|
|
|
Penetration Testing with Raspberry Pi - Second Edition.
|
Bestseller
|
2016
|
|
QA76.9.A25 M374 2008eb : Martin, Luther.
|
|
|
Introduction to identity-based encryption / Luther Martin.
|
Bestseller
|
2008
|
|
QA76.9.A25 M393 2013eb : Mayoral, Fernando.
|
|
|
Instant Java password and authentication security : a practical, hands-on guide to securing Java appl
|
Bestseller
|
2013
|
|
QA76.9.A25 M396 2007eb : Maynor, David.
|
|
|
Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David M
|
Bestseller
|
2007
|
|
QA76.9.A25 .M443 2018 : Megahed, Hamza.
|
|
|
Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system v
|
Bestseller
|
2018
|
|
QA76.9.A25 M457 2007 : Mendell, Ronald L.
|
|
|
Document Security : Protecting Physical and Electronic Content.
|
Bestseller
|
2007
|
|
QA76.9.A25 M55 2001eb : Miles, Wyman.
|
|
|
Hack proofing Sun Solaris 8 / Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical edit
|
Bestseller
|
2001
|
|
QA76.9.A25 M563 2007eb
|
|
|
Microsoft Vista for IT security professionals / Anthony Piltzecker, technical editor ; Larry Chaffin
|
Bestseller
|
2007
|
|
QA76.9.A25 .M582 2009 : Mischel, Magnus.
|
|
|
ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application ha
|
Bestseller
|
2009
|
|
QA76.9.A25 N275 2007eb
|
|
|
National security / edited by H. Chen [and others].
|
Bestseller
|
2007
|
|
QA76.9.A25 N28 2007eb : NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area
|
|
|
A process for developing a common vocabulary in the information security area / edited by Jan von Kno
|
Bestseller
|
2007
|
|
QA76.9.A25 N35 2019 : Najera-Gutierrez, Gilberto,
|
|
|
Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Lin
|
Bestseller
|
2019
|
|
QA76.9.A25 N37 2018 : National Academies of Sciences, Engineering, and Medicine (U.S.).
|
|
|
Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and
|
Bestseller
|
2018
|
|
QA76.9.A25 N373 2010 ebook : National Research Council (U.S.).
|
|
|
Toward better usability, security, and privacy of information technology : report of a workshop / Ste
|
Bestseller
|
2010
|
|
QA76.9.A25 N3753 2006eb : NATO Advanced Research Workshop on Information Assurance and Computer Security
|
|
|
Information assurance and computer security / edited by Johnson P. Thomas and Mohamed Essaaidi.
|
Bestseller
|
2006
|
|
QA76.9.A25 N3754 2007eb : NATO Advanced Study Institute on Formal Logical Methods for System Security and Correctness
|
|
|
Formal logical methods for system security and correctness / edited by Orna Grumberg, Tobias Nipkow a
|
Bestseller
|
2008
|
|
QA76.9.A25 N378 2006eb : NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects
|
|
|
Secure telematic applications for national scale projects / edited by Jean-Guy Fontaine and Mikhail M
|
Bestseller
|
2008
|
|
QA76.9.A25 N38 2004eb : Nazario, Jose.
|
|
|
Defense and detection strategies against Internet worms / Jose Nazario.
|
Bestseller
|
2004
|
|
QA76.9.A25 N38 2017eb : National Academies of Sciences, Engineering, and Medicine (U.S.).
|
|
|
Foundational cybersecurity research : improving science, engineering, and institutions / Lynette I. M
|
Bestseller
|
2015
|
|
QA76.9.A25 N384 2013 : Neeraj, Nishant.
|
|
|
Mastering Apache Cassandra : get comfortable with the fastest NoSQL database, its architecture, key p
|
Bestseller
|
2013
|
|
QA76.9.A25 N63 2003eb : Noble, Jim.
|
|
|
Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others]
|
Bestseller
|
2003
|
|
QA76.9.A25 .N653 2014 : Nolan, Catherine.
|
|
|
The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashl
|
Bestseller
|
2014
|
|
QA76.9.A25 O67 2003eb : Oppliger, Rolf.
|
|
|
Security technologies for the World Wide Web / Rolf Oppliger.
|
Bestseller
|
2003
|
|
QA76.9.A25 O67 2021 : Oppliger, Rolf,
|
|
|
Cryptography 101 : from theory to practice / Rolf Oppliger.
|
Bestseller
|
2021
|
|
QA76.9.A25 O83 2006eb : Osborne, Mark
|
|
|
How to cheat at managing information security / Mark Osborne ; Paul M. Summitt, technical editor.
|
Bestseller
|
2006
|
|
QA76.9.A25 O95 2021 : Ozkaya, Erdal.
|
|
|
Incident Response in the Age of Cloud : Techniques and Best Practices to Effectively Respond to Cyber
|
Bestseller
|
2021
|
|
QA76.9.A25 O95 2022 : Ozkaya, Erdal,
|
|
|
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cyberse
|
Bestseller
|
2022
|
|
QA76.9.A25 P37 2019 : Parisi, Alessandro,
|
|
|
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber
|
Bestseller
|
2019
|
|
QA76.9.A25 P414 2007eb
|
|
|
PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor
|
Bestseller
|
2007
|
|