QA76.9.A25 E5465 2006
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies / |
1 |
QA76.9.A25 E63 2012
|
Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager / |
1 |
QA76.9.A25 E73 2001eb
|
Executive's guide to privacy management / |
1 |
QA76.9.A25 E737 2005eb
|
Trojans, worms, and spyware : a computer security professional's guide to malicious code / |
2 |
QA76.9.A25 E74 2004b
|
Implementing homeland security for enterprise IT / |
1 |
QA76.9.A25 E75 2008eb
|
Hacking : the art of exploitation / |
1 |
QA76.9.A25 E83 1998
|
The Department of Defense and the age of information operations / |
1 |
QA76.9.A25 E996 2019
|
Exploring security in software architecture and design / |
1 |
QA76.9.A25 F333 2013eb
|
Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance / |
1 |
QA76.9.A25 F35 2005eb
|
Cyber spying : tracking your family's (sometimes) secret online lives / |
1 |
QA76.9.A25 .F384 2012
|
IT-Sicherheit & Datenschutz. |
1 |
QA76.9.A25 F43 2013
|
Federated identity primer / |
1 |
QA76.9.A25 F466 2010eb
|
Cryptography engineering : design principles and practical applications / |
1 |
QA76.9.A25 F47 2003eb
|
Role-based access controls / |
1 |
QA76.9.A25 F47 2007eb
|
Role-based access control / |
1 |
QA76.9.A25 .F477 2021
|
DevOps for Trustworthy Smart IoT Systems. |
1 |
QA76.9.A25 F525 2003eb
|
Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology / |
1 |
QA76.9.A25 F55 2014
|
FileVault 2 for Mac OS X decoded / |
1 |
QA76.9.A25 F57 2013
|
FISMA and the risk management framework : the new practice of federal cyber security / |
1 |
QA76.9.A25 F654 2011
|
Formal models and techniques for analyzing security protocols / |
1 |