Call Number (LC) Title Results
QA76.9.A25 N67 2009 Information security technology for applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers / 1
QA76.9.A25 N67 2011 Information security technology for applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers / 1
QA76.9.A25 N67 2012 Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings /
Secure IT systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings /
2
QA76.9.A25 N88 2017 Number-theoretic methods in cryptology : first international conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers / 1
QA76.9.A25 O25 2022 Theoretical cybersecurity : principles and advanced concepts / 3
QA76.9.A25 O325 2018 Linux basics for hackers getting started with networking, scripting, and security in Kali / 1
QA76.9.A25 O34 2003eb Windows security portable reference / 1
QA76.9.A25 O34 2007eb The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.
The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.
2
QA76.9.A25 O34 2011 Official (ISC)2 guide to the ISSMP CBK / 1
QA76.9.A25 O34 2014eb Official (ISC)2 guide to the CSSLP CBK / 1
QA76.9.A25 O34 2021 Cybersecurity in the COVID-19 Pandemic / 1
QA76.9.A25 O34 2021eb Cybersecurity in the COVID-19 pandemic / 2
QA76.9.A25 O344 2012 Official (ISC)² guide to the ISSMP CBK / 1
QA76.9.A25 O35 2023 10 machine learning blueprints you should know for cybersecurity : protect your network and data with cutting-edge ai techniques & projects to boost your cybersecurity defenses / 1
QA76.9.A25 O36 2022 Cybersecurity risk management : an enterprise risk management approach / 1
QA76.9.A25 O54 2023 How to catch a phish : a practical guide to detecting phishing emails / 2
QA76.9.A25 O55 2009eb Secure multi-party non-repudiation protocols and applications 1
QA76.9.A25 O64 2004 IT security : advice from experts / 2
QA76.9.A25 O64 2020 Open source intelligence and cyber crime social media analytics /
Open source intelligence and cyber crime : social media analytics /
2
QA76.9.A25 O67 1993 Security for object-oriented systems : proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 /
Security for object-oriented systems proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 /
2