Call Number (LC) Title Results
QA76.9.A25 P75 2022 Privacy and data protection in software services / 1
QA76.9.A25 P76 2021 Protecting privacy through homomorphic encryption / 1
QA76.9.A25 P76 2023 Provable and practical security : 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings / 1
QA76.9.A25 .P763 2014 Procuring penetration testing services. 1
QA76.9.A25 P82 2005 Public-key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland / 1
QA76.9.A25 P88 2004eb A practical guide to managing information security / 1
QA76.9.A25 P89 2002eb Putting the latest z/OS security features to work / 1
QA76.9.A25 QA76.9.A25 M875 2006eb QA76.9.A25M875 2006 Multimedia Security Technologies for Digital Rights Management. 1
QA76.9.A25 Q36 2003eb Quantum cryptography : potentially perfect security. 1
QA76.9.A25 RA36 2019 Rewired : the Past, Present, and Future of Cybersecurity. 1
QA76.9.A25 R337 2010eb Information security management : concepts and practice / 1
QA76.9.A25 R34 2020 A complete guide to Burp Suite : learn to detect application vulnerabilities / 1
QA76.9.A25 R356 2014 Core software security : security at the source / 1
QA76.9.A25 R36 2007eb Linux firewalls : attack detection and response with iptables, psad, and fwsnort / 1
QA76.9.A25 R36 2011eb BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / 1
QA76.9.A25 R38 2007 Open source fuzzing tools. 1
QA76.9.A25 R56 2020 Riot in the matrix / 1
QA76.9.A25 .R698 2023 Modern Vulnerability Management 1
QA76.9.A25 R87 2016 Practical internet of things security / 1
QA76.9.A25 R93 2005eb Basics of contemporary cryptography for IT practitioners / 1