Search again

Found: 36  Titles

Order by :    Show:   Per Page
image

image

image
Introduction to cryptography principles and applications / Hans Delfs, Helmut Knebl.
Author
Delfs, Hans.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image
Learn ethical hacking from scratch your stepping stone to penetration testing / Zaid Sabih.
Author
Sabih, Zaid.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image

image
Moving target defense creating asymmetric uncertainty for cyber threats / Sushil Jajodia ... [et al.], editors
Author
Jajodia, Sushil,
Published
New York : Springer, c2011.
Call Number
Ebook

image
Network science and cybersecurity Robinson E. Pino, editor.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image

image

image
Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus / Ajay Singh Chauhan.
Author
Chauhan, Ajay Singh.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image
Preventing good people from doing bad things implementing least privilege / John Mutch, Brian Anderson
Author
Mutch, John
Published
Berkeley, CA : Apress, c2011.
Call Number
Ebook

image

image
Privacy vs. security Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan.
Author
Stalla-Bourdillon, Sophie.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image

image

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles