Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 N54 2016 | Kali Linux Web Penetration Testing Cookbook. | 1 |
QA76.9.A25 N54 2023 | Discovering cybersecurity : A Technical Introduction for the Absolute Beginner / | 3 |
QA76.9.A25 N63 2003eb | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting / | 1 |
QA76.9.A25 N67 2009 | Information security technology for applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers / | 1 |
QA76.9.A25 N67 2011 | Information security technology for applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers / | 1 |
QA76.9.A25 N67 2012 |
Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings / Secure IT systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings / |
2 |
QA76.9.A25 N88 2017 | Number-theoretic methods in cryptology : first international conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers / | 1 |
QA76.9.A25 O25 2022 | Theoretical cybersecurity : principles and advanced concepts / | 3 |
QA76.9.A25 O325 2018 | Linux basics for hackers getting started with networking, scripting, and security in Kali / | 1 |
QA76.9.A25 O34 2003eb | Windows security portable reference / | 1 |
QA76.9.A25 O34 2007eb |
The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator. The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. |
2 |
QA76.9.A25 O34 2011 | Official (ISC)2 guide to the ISSMP CBK / | 1 |
QA76.9.A25 O34 2014eb | Official (ISC)2 guide to the CSSLP CBK / | 1 |
QA76.9.A25 O34 2021 | Cybersecurity in the COVID-19 Pandemic / | 1 |
QA76.9.A25 O34 2021eb | Cybersecurity in the COVID-19 pandemic / | 2 |
QA76.9.A25 O344 2012 | Official (ISC)² guide to the ISSMP CBK / | 1 |
QA76.9.A25 O35 2023 | 10 machine learning blueprints you should know for cybersecurity : protect your network and data with cutting-edge ai techniques & projects to boost your cybersecurity defenses / | 1 |
QA76.9.A25 O36 2022 | Cybersecurity risk management : an enterprise risk management approach / | 1 |
QA76.9.A25 O54 2023 | How to catch a phish : a practical guide to detecting phishing emails / | 2 |
QA76.9.A25 O55 2009eb | Secure multi-party non-repudiation protocols and applications | 1 |