1. International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence /: Applications and Techniques in Cyber Security and Intelligence. ([2019]) Editors: Abawajy, Jemal H, 1982-; Choo, Kim-Kwang Raymond; Islam, Rafiqul; Xu, Zheng; Atiquzzaman, Mohammed Other Names: International Conference on Applications and Techniques in Cyber Security and Intelligence Record Type: Book Extent: 1 online resource (1387 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Information security practices : emerging threats and perspectives /: emerging threats and perspectives. ([2017]) Editors: Traore, Issa, 1965-; Awad, Ahmed; Woungang, Isaac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Cyber security. Simply. Make it happen. : leveraging digitization through IT security /: leveraging digitization through IT security. (2017) Editors: Abolhassan, Ferri Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Advances in user authentication. ([2017]) Authors: Dasgupta, D (Dipankar), 1958-; Roy, Arunava; Nag, Abhijit Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. From hacking to report writing : an introduction to security and penetration testing /: an introduction to security and penetration testing. (2016) Authors: Svensson, Robert Record Type: Book Extent: 1 online resource (xxii, 190 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Privileged attack vectors : building effective cyber-defense strategies to protect organizations /: building effective cyber-defense strategies to protect organizations. (2018) Authors: Haber, Morey J; Hibbert, Brad Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Security in network coding. ([2016]) Authors: Zhang, Peng; Lin, Chuang Record Type: Book Extent: 1 online resource (xi, 98 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. SDN and NFV security : security analysis of software-defined networking and network function virtualization /: security analysis of software-defined networking and network function virtualization. (2018) Editors: Khondoker, Rahamatullah Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. International Conference on Applications and Techniques in Cyber Security and Intelligence : applications and techniques in cyber security and intelligence /: applications and techniques in cyber security and intelligence. (2018) Editors: Abawajy, Jemal H, 1982-; Choo, Kim-Kwang Raymond; Islam, Rafiqul Other Names: International Conference on Applications and Techniques in Cyber Security and Intelligence Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux /: over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux. (2014) Authors: Vermeulen, Sven Other Names: Santhan, Sarath cover designer. Record Type: Book Extent: 1 online resource (240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗