Call Number (LC) Title Results
QA76.9.A25 H387 2008eb OSSEC host-based intrusion detection guide / 1
QA76.9.A25 H392 2010eb IT security metrics : a practical framework for measuring security & protecting data / 2
QA76.9.A25 H435 2001 Securing E-Business applications and communications / 1
QA76.9.A25 H44 2016 Cybersecurity / 1
QA76.9.A25 H455 2004b HP Nonstop server security : a practical handbook / 1
QA76.9.A25 H47 2022 Snowflake security : securing your Snowflake data cloud / 1
QA76.9.A25 H48 2022 Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. 1
QA76.9.A25 H53 2020eb Hands on hacking / 2
QA76.9.A25 H626 2021eb Privacy is hard and seven other myths : achieving privacy through careful design / 1
QA76.9.A25 H635 2004 Exploiting software : how to break code / 1
QA76.9.A25 H637 2005 Rootkits : subverting the Windows kernel / 1
QA76.9.A25 H65 2010 ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment / 1
QA76.9.A25 .H68 2006 The security development lifecycle : SDL, a process for developing demonstrably more secure software / 1
QA76.9.A25 H69 2023 Cybersecurity first principles : a reboot of strategy and tactics / 1
QA76.9.A25 H6976 2011eb Security 2020 : reduce security risks this decade / 1
QA76.9.A25 H6977 2010eb 24 deadly sins of software security : programming flaws and how to fix them / 2
QA76.9.A25 H698 2003eb Writing secure code : practical strategies and proven techniques for building secure applications in a networked world / 2
QA76.9.A25 H74 Computer security / 1
QA76.9.A25 H84 2024 Effective vulnerability management : managing risk in the vulnerable digital ecosystem / 1
QA76.9.A25 H855 2016eb Implementing the ISO/IEC 27001 ISMS standard / 1