QA76.9.A25 P75 2022
|
Privacy and data protection in software services / |
1 |
QA76.9.A25 P76 2021
|
Protecting privacy through homomorphic encryption / |
1 |
QA76.9.A25 P76 2023
|
Provable and practical security : 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings / |
1 |
QA76.9.A25 .P763 2014
|
Procuring penetration testing services. |
1 |
QA76.9.A25 P82 2005
|
Public-key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland / |
1 |
QA76.9.A25 P88 2004eb
|
A practical guide to managing information security / |
1 |
QA76.9.A25 P89 2002eb
|
Putting the latest z/OS security features to work / |
1 |
QA76.9.A25 QA76.9.A25 M875 2006eb QA76.9.A25M875 2006
|
Multimedia Security Technologies for Digital Rights Management. |
1 |
QA76.9.A25 Q36 2003eb
|
Quantum cryptography : potentially perfect security. |
1 |
QA76.9.A25 RA36 2019
|
Rewired : the Past, Present, and Future of Cybersecurity. |
1 |
QA76.9.A25 R337 2010eb
|
Information security management : concepts and practice / |
1 |
QA76.9.A25 R34 2020
|
A complete guide to Burp Suite : learn to detect application vulnerabilities / |
1 |
QA76.9.A25 R356 2014
|
Core software security : security at the source / |
1 |
QA76.9.A25 R36 2007eb
|
Linux firewalls : attack detection and response with iptables, psad, and fwsnort / |
1 |
QA76.9.A25 R36 2011eb
|
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / |
1 |
QA76.9.A25 R38 2007
|
Open source fuzzing tools. |
1 |
QA76.9.A25 R56 2020
|
Riot in the matrix / |
1 |
QA76.9.A25 .R698 2023
|
Modern Vulnerability Management |
1 |
QA76.9.A25 R87 2016
|
Practical internet of things security / |
1 |
QA76.9.A25 R93 2005eb
|
Basics of contemporary cryptography for IT practitioners / |
1 |