1031. Software security : concepts & practices /: concepts & practices. (2023) Authors: Khan, Suhel Ahmad; Kumar, Rajeev, 1991-; Khan, R. A (Raees Ahmad) Record Type: Book Extent: 1 online resource (296 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1032. The art of cyber security : a practical guide to winning the war on cyber crime /: a practical guide to winning the war on cyber crime. (2022) Authors: Hibberd, Gary Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1033. Digital earth : cyber threats, privacy and ethics in an age of paranoia /: cyber threats, privacy and ethics in an age of paranoia. (2022) Authors: Katz, Sarah Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1034. Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats in your organization /: discover risk mitigation strategies for modern threats in your organization. (2023) Authors: Rains, Tim Other Names: Youngblood CISSP, Timothy writer of supplementary textual content. Record Type: Book Extent: 1 online resource (380 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1035. Mobile Security : Schwachstellen verstehen und Angriffsszenarien nachvollziehen /: Schwachstellen verstehen und Angriffsszenarien nachvollziehen. (2020) Authors: Westhoff, Dirk Record Type: Book Extent: 1 online resource (262 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1036. Embedded Systems and Artificial Intelligence : Proceedings of ESAI 2019, Fez, Morocco /: Proceedings of ESAI 2019, Fez, Morocco. (2020) Editors: Bhateja, Vikrant; Satapathy, Suresh Chandra; Satori, Hassan Record Type: Book Extent: 1 online resource (910 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1037. Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields /: Applied to the Living Safety and Medical Fields. (2020) Editors: Miyaji, Atsuko; Mimoto, Tomoaki Record Type: Book Extent: 1 online resource (166 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1038. Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). (2020) Editors: Singh, Pradeep Kumar; Pawłowski, Wiesław; Tanwar, Sudeep; Kumar, Neeraj; Rodrigues, Joel J. P. C; Obaidat, Mohammad Salameh Record Type: Book Extent: 1 online resource (917 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1039. Cybersecurity for information professionals : concepts and applications /: concepts and applications. (2020) Editors: Al-Hawamdeh, Suliman; Chang, Hsia-Ching Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1040. Intelligent Computing and Innovation on Data Science : Proceedings of ICTIDS 2019 /: Proceedings of ICTIDS 2019. (2020) Editors: Peng, Sheng-Lung; Son, Le Hoang; Suseendran, G; Balaganesh, D Record Type: Book Extent: 1 online resource (801 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗