Call Number (LC) Title Results
QA76.9.A25 E5465 2006 Enterprise security : IT security solutions : concepts, practical experiences, technologies / 1
QA76.9.A25 E63 2012 Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager / 1
QA76.9.A25 E73 2001eb Executive's guide to privacy management / 1
QA76.9.A25 E737 2005eb Trojans, worms, and spyware : a computer security professional's guide to malicious code / 2
QA76.9.A25 E74 2004b Implementing homeland security for enterprise IT / 1
QA76.9.A25 E75 2008eb Hacking : the art of exploitation / 1
QA76.9.A25 E83 1998 The Department of Defense and the age of information operations / 1
QA76.9.A25 E996 2019 Exploring security in software architecture and design / 1
QA76.9.A25 F333 2013eb Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance / 1
QA76.9.A25 F35 2005eb Cyber spying : tracking your family's (sometimes) secret online lives / 1
QA76.9.A25 .F384 2012 IT-Sicherheit & Datenschutz. 1
QA76.9.A25 F43 2013 Federated identity primer / 1
QA76.9.A25 F466 2010eb Cryptography engineering : design principles and practical applications / 1
QA76.9.A25 F47 2003eb Role-based access controls / 1
QA76.9.A25 F47 2007eb Role-based access control / 1
QA76.9.A25 .F477 2021 DevOps for Trustworthy Smart IoT Systems. 1
QA76.9.A25 F525 2003eb Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology / 1
QA76.9.A25 F55 2014 FileVault 2 for Mac OS X decoded / 1
QA76.9.A25 F57 2013 FISMA and the risk management framework : the new practice of federal cyber security / 1
QA76.9.A25 F654 2011 Formal models and techniques for analyzing security protocols / 1