1. Advances in information and communication networks : proceedigns of the 2018 Future of Information and Communication Conference (FICC).: proceedigns of the 2018 Future of Information and Communication Conference (FICC). Volume 2 ([2019]) Editors: Arai, Kohei; Kapoor, Supriya; Bhatia, Rahul Other Names: Future of Information and Communication Conference Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Advances in information and communication networks : proceedigns of the 2018 Future of Information and Communication Conference (FICC).: proceedigns of the 2018 Future of Information and Communication Conference (FICC). Volume 2 ([2019]) Editors: Arai, Kohei; Kapoor, Supriya; Bhatia, Rahul Other Names: Future of Information and Communication Conference Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Becoming the hacker : the playbook for getting inside the mind of an attacker /: the playbook for getting inside the mind of an attacker. (2019) Authors: Pruteanu, Adrian Record Type: Book Extent: 1 online resource (405 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Cyber resilience of systems and networks. ([2019]) Editors: Kott, Alexander, 1971-; Linkov, Igor Record Type: Book Extent: 1 online resource (475 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Dynamic games for network security. (2018) Authors: He, Xiaofan; Dai, Huaiyu, 1973- Record Type: Book Extent: 1 online resource (x, 74 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Hacken für Dummies. (2017) Authors: Beaver, Kevin Other Names: Franken, Gerhard translator.; (Translator) Schmidt, Jutta translator. Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Getting started with FortiGate simplify and protect your network using the FortiGate network security applicance /: simplify and protect your network using the FortiGate network security applicance. (2013) Other Names: Fabbri, Rosato; Volpe, Fabrizio Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Applied network security : master the art of detecting and averting advanced network security attacks and techniques /: master the art of detecting and averting advanced network security attacks and techniques. (2017) Authors: Salmon, Arthur; Levesque, Warun; McLafferty, Michael Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Circuits and systems for security and privacy. (2016) Editors: Sheikh, Farhana; Sousa, Leonel A (Leonel Augusto); Iniewski, Krzysztof, 1960- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach /: an artificial intelligence approach. (2018) Editors: Parkinson, Simon; Crampton, Andrew; Hill, Richard Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗