Call Number (LC) Title Results
QA76.9.A25 F656 2010 Vulnerability management / 1
QA76.9.A25 F67 2004eb Programmer's ultimate security deskref / 2
QA76.9.A25 F67 2006eb Writing security tools and exploits / 1
QA76.9.A25 .F674 2019 Vulnerability Management. 1
QA76.9.A25 F74 2020eb Cybersecurity and decision makers : data security and digital trust / 1
QA76.9.A25 F75 2010 Steganography in digital media : principles, algorithms, and applications / 2
QA76.9.A25 F85 2014eb Intrusion detection networks : a key to collaborative security / 1
QA76.9.A25 F89 2018eb Fuzzing for software security testing and quality assurance / 1
QA76.9.A25 G35 2002eb Cryptography for Internet and database applications : developing secret and public key techniques with Java / 1
QA76.9.A25 G35 2020eb The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / 1
QA76.9.A25 G356 2006 Hunting security bugs / 1
QA76.9.A25 G358 2008eb Mastering System Center Data Protection Manager 2007 / 1
QA76.9.A25 G36 1995eb PGP : pretty good privacy / 1
QA76.9.A25 G37 2003 Kerberos : the definitive guide / 1
QA76.9.A25 G46 2016eb Audio content security : attack analysis on audio watermarking / 1
QA76.9.A25 G47 2011 Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären / 1
QA76.9.A25 G535 2014 Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / 1
QA76.9.A25 G63 2011 Client-Honeypots : Exploring Malicious Websites / 1
QA76.9.A25 G66 2014eb Hacking point of sale : payment application secrets, threats, and solutions / 1
QA76.9.A25 G66 2015 Group theoretic cryptography / 1