QA76.9.A25 H387 2008eb
|
OSSEC host-based intrusion detection guide / |
1 |
QA76.9.A25 H392 2010eb
|
IT security metrics : a practical framework for measuring security & protecting data / |
2 |
QA76.9.A25 H435 2001
|
Securing E-Business applications and communications / |
1 |
QA76.9.A25 H44 2016
|
Cybersecurity / |
1 |
QA76.9.A25 H455 2004b
|
HP Nonstop server security : a practical handbook / |
1 |
QA76.9.A25 H47 2022
|
Snowflake security : securing your Snowflake data cloud / |
1 |
QA76.9.A25 H48 2022
|
Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response. |
1 |
QA76.9.A25 H53 2020eb
|
Hands on hacking / |
2 |
QA76.9.A25 H626 2021eb
|
Privacy is hard and seven other myths : achieving privacy through careful design / |
1 |
QA76.9.A25 H635 2004
|
Exploiting software : how to break code / |
1 |
QA76.9.A25 H637 2005
|
Rootkits : subverting the Windows kernel / |
1 |
QA76.9.A25 H65 2010
|
ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment / |
1 |
QA76.9.A25 .H68 2006
|
The security development lifecycle : SDL, a process for developing demonstrably more secure software / |
1 |
QA76.9.A25 H69 2023
|
Cybersecurity first principles : a reboot of strategy and tactics / |
1 |
QA76.9.A25 H6976 2011eb
|
Security 2020 : reduce security risks this decade / |
1 |
QA76.9.A25 H6977 2010eb
|
24 deadly sins of software security : programming flaws and how to fix them / |
2 |
QA76.9.A25 H698 2003eb
|
Writing secure code : practical strategies and proven techniques for building secure applications in a networked world / |
2 |
QA76.9.A25 H74
|
Computer security / |
1 |
QA76.9.A25 H84 2024
|
Effective vulnerability management : managing risk in the vulnerable digital ecosystem / |
1 |
QA76.9.A25 H855 2016eb
|
Implementing the ISO/IEC 27001 ISMS standard / |
1 |