TK5105.59 .I584 2020
|
Intelligent Network Management and Control Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. |
1 |
TK5105.59 .I646 2015
|
Information assurance handbook : effective computer security and risk management strategies / |
1 |
TK5105.59 I68 2012
|
Integrating IBM security and SAP solutions / |
1 |
TK5105.59 .I83 2012
|
Securing Mobile Devices / |
1 |
TK5105.59 .I863 2018eb
|
.NET Standard 2.0 Cookbook : Develop high quality, fast and portable applications by leveraging the power of .NET Standard Library. |
1 |
TK5105.59 .J325 2010eb
|
Network security auditing / |
1 |
TK5105.59 .J33 2009
|
Introduction to network security / |
1 |
TK5105.59 .J33 2015
|
Introduction to Network Security |
1 |
TK5105.59 .J37 2019
|
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools / |
1 |
TK5105.59 .J49 2021
|
Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control / |
3 |
TK5105.59 .J64 2021eb
|
Data protection officer / |
1 |
TK5105.59 .J67 2002eb
|
IIS security / |
1 |
TK5105.59 .K33 2007
|
Endpoint security / |
1 |
TK5105.59 K364 2021
|
Game Theory and Machine Learning for Cyber Security. |
1 |
TK5105.59 .K37 2009
|
Security of information and communication networks / |
1 |
TK5105.59 .K43 2020
|
All-in-One Implementing and Administering Cisco Solutions : CCNA Exam 200-301 Cert Guide / |
1 |
TK5105.59 .K44 2019eb
|
Zero trust networks with VMware NSX : build highly secure network architectures for your data centers / |
3 |
TK5105.59 .K45 2012eb
|
Bring your own device (BYOD) security audit/assurance program / |
1 |
TK5105.59 .K56 2023
|
Losing the cybersecurity war : and what we can do to stop it / |
1 |
TK5105.59 .K578 2005
|
Computer network security / |
3 |