Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 E39 2002 | Informed watermarking / | 1 |
QA76.9.A25 E39 2025 |
A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice / Jason Edwards. A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice / |
2 |
QA76.9.A25 E398 2017 | Guide to pairing-based cryptography / | 1 |
QA76.9.A25 E43 2007eb | Embedded Java security security for mobile devices / | 1 |
QA76.9.A25 E43 2009eb | Understanding and applying cryptography and data security / | 1 |
QA76.9.A25 E45 2013 | Malware, rootkits & botnets : a beginner's guide / | 1 |
QA76.9.A25 .E45 2015 | Advanced Malware Analysis / | 1 |
QA76.9.A25 .E45 2017 | Hacking Exposed Malware and Rootkits : Security Secrets and Solutions, Second Edition / | 1 |
QA76.9.A25 E466 2019eb | Emerging security algorithms and techniques / | 1 |
QA76.9.A25 E467 2013eb | Emerging trends in ICT security / | 3 |
QA76.9.A25 E49 2007eb | Encryption facility for z/OS V1.2 OpenPGP support / | 1 |
QA76.9.A25 E53 2011eb | Encyclopedia of cryptography and security | 1 |
QA76.9.A25 E54 2009 | Engineering secure software and systems First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / | 1 |
QA76.9.A25 E5425 2007eb | Engaging privacy and information technology in a digital age / | 1 |
QA76.9.A25 E544 1999 | Elliptic curves and their applications to cryptography : an introduction / | 1 |
QA76.9.A25 E5443 2010eb | The basics of hacking and penetration testing ethical hacking and penetration testing made easy / | 1 |
QA76.9.A25 E5443 2011eb | The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / | 1 |
QA76.9.A25 E5443 2013 | The basics of hacking and penetration testing ethical hacking and penetration testing made easy / | 1 |
QA76.9.A25 E5443 2013eb |
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / The basics of hacking and penetration testing ethical hacking and penetration testing made easy / |
3 |
QA76.9.A25 E545 2005 | Enhanced methods in computer security, biometric and artificial intelligence systems / | 3 |