Call Number (LC) Title Results
QA76.9.A25 E39 2002 Informed watermarking / 1
QA76.9.A25 E39 2025 A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice / Jason Edwards.
A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice /
2
QA76.9.A25 E398 2017 Guide to pairing-based cryptography / 1
QA76.9.A25 E43 2007eb Embedded Java security security for mobile devices / 1
QA76.9.A25 E43 2009eb Understanding and applying cryptography and data security / 1
QA76.9.A25 E45 2013 Malware, rootkits & botnets : a beginner's guide / 1
QA76.9.A25 .E45 2015 Advanced Malware Analysis / 1
QA76.9.A25 .E45 2017 Hacking Exposed Malware and Rootkits : Security Secrets and Solutions, Second Edition / 1
QA76.9.A25 E466 2019eb Emerging security algorithms and techniques / 1
QA76.9.A25 E467 2013eb Emerging trends in ICT security / 3
QA76.9.A25 E49 2007eb Encryption facility for z/OS V1.2 OpenPGP support / 1
QA76.9.A25 E53 2011eb Encyclopedia of cryptography and security 1
QA76.9.A25 E54 2009 Engineering secure software and systems First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / 1
QA76.9.A25 E5425 2007eb Engaging privacy and information technology in a digital age / 1
QA76.9.A25 E544 1999 Elliptic curves and their applications to cryptography : an introduction / 1
QA76.9.A25 E5443 2010eb The basics of hacking and penetration testing ethical hacking and penetration testing made easy / 1
QA76.9.A25 E5443 2011eb The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / 1
QA76.9.A25 E5443 2013 The basics of hacking and penetration testing ethical hacking and penetration testing made easy / 1
QA76.9.A25 E5443 2013eb The basics of hacking and penetration testing : ethical hacking and penetration testing made easy /
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
3
QA76.9.A25 E545 2005 Enhanced methods in computer security, biometric and artificial intelligence systems / 3