QA76.9.A25 F656 2010
|
Vulnerability management / |
1 |
QA76.9.A25 F67 2004eb
|
Programmer's ultimate security deskref / |
2 |
QA76.9.A25 F67 2006eb
|
Writing security tools and exploits / |
1 |
QA76.9.A25 .F674 2019
|
Vulnerability Management. |
1 |
QA76.9.A25 F74 2020eb
|
Cybersecurity and decision makers : data security and digital trust / |
1 |
QA76.9.A25 F75 2010
|
Steganography in digital media : principles, algorithms, and applications / |
2 |
QA76.9.A25 F85 2014eb
|
Intrusion detection networks : a key to collaborative security / |
1 |
QA76.9.A25 F89 2018eb
|
Fuzzing for software security testing and quality assurance / |
1 |
QA76.9.A25 G35 2002eb
|
Cryptography for Internet and database applications : developing secret and public key techniques with Java / |
1 |
QA76.9.A25 G35 2020eb
|
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide / |
1 |
QA76.9.A25 G356 2006
|
Hunting security bugs / |
1 |
QA76.9.A25 G358 2008eb
|
Mastering System Center Data Protection Manager 2007 / |
1 |
QA76.9.A25 G36 1995eb
|
PGP : pretty good privacy / |
1 |
QA76.9.A25 G37 2003
|
Kerberos : the definitive guide / |
1 |
QA76.9.A25 G46 2016eb
|
Audio content security : attack analysis on audio watermarking / |
1 |
QA76.9.A25 G47 2011
|
Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären / |
1 |
QA76.9.A25 G535 2014
|
Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / |
1 |
QA76.9.A25 G63 2011
|
Client-Honeypots : Exploring Malicious Websites / |
1 |
QA76.9.A25 G66 2014eb
|
Hacking point of sale : payment application secrets, threats, and solutions / |
1 |
QA76.9.A25 G66 2015
|
Group theoretic cryptography / |
1 |