1241. The art of war for computer security. (2019) Other Names: Madsen, Tom Record Type: Book Extent: 1 online resource (62 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1242. Cryptanalysis of number theoretic ciphers. (2019) Authors: Jr, Wagstaff, Samuel S, 1945- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1243. Practical security properties on commodity computing platforms : the uber extensible micro-hypervisor framework /: the uber extensible micro-hypervisor framework. (2019) Authors: Vasudevan, Amit Record Type: Book Extent: 1 online resource (xix, 85 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1244. Safe and secure cyber-physical systems and Internet-of-Things systems. (2020) Authors: Wolf, Marilyn, 1958-; Serpanos, Dimitrios Nikolaou Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1245. Mobile Computing, Applications, and Services : 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedings /: 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedings. (2019) Editors: Yin, Yuyu; Li, Ying; Gao, Honghao; Zhang, Jilin Record Type: Book Extent: 1 online resource (245 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1246. Information security and digital forensics : threatscape and best practices /: threatscape and best practices. (2015) Authors: Sammons, John Editors: Sammons, John Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1247. Developing Applications with Azure Active Directory : Principles of Authentication and Authorization for Architects and Developers /: Principles of Authentication and Authorization for Architects and Developers. (2019) Authors: Mayank, Manas; Garg, Mohit Record Type: Book Extent: 1 online resource (284 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1248. Cybersecurity for dummies. (2019) Authors: (Cybersecurity expert), Steinberg, Joseph Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1249. The Art of Modelling Computational Systems : a journey from logic and concurrency to security and privacy : Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday /: a journey from logic and concurrency to security and privacy : Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday. ([2019]) Other Names: Alvim, Mário S; Chatzikokolakis, Kostas; Olarte, Carlos; Valencia, Frank Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1250. System Administration Ethics : Ten Commandments for Security and Compliance in a Modern Cyber World /: Ten Commandments for Security and Compliance in a Modern Cyber World. ([2019]) Authors: Ljubuncic, Igor Other Names: Litterer, Tom Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗