1351. Financial cryptography and data security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised selected papers /: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised selected papers. (2019) Editors: Zohar, Aviv; Eyal, Ittay; Teague, Vanessa; (Assistant professor), Clark, Jeremy; Bracciali, Andrea; Pintore, Federico; Sala, Massimiliano Other Names: FC (Conference), 22nd; BITCOIN (Workshop); VOTING (Workshop); WTSC (Workshop) Record Type: Book Extent: 1 online resource (xv, 382 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1352. Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks /: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks. (2019) Authors: Kleymenov, Alexey; Thabet, Amr Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1353. Cybersecurity and secure information systems : challenges and solutions /: challenges and solutions. ([2019]) Editors: Hassanien, Aboul Ella; Elhoseny, Mohamed Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1354. Accessing public services through the Government's Verify digital system : Ninety-Fifth Report of Session 2017/19.: Ninety-Fifth Report of Session 2017/19. Oral and written evidence / Volume 2, ([2019-05-08]) Other Names: Great Britain., Parliament., House of Commons., Committee of Public Accounts. Record Type: Book Extent: 1 online resource (51 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1355. Learning Python for forensics. (2016) Authors: Miller, Preston; Bryce, Chapin Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1356. Perl scripting for Windows security : live response, forensic analysis, and monitoring /: live response, forensic analysis, and monitoring. (2011) Other Names: Carvey, Harlan A; Kleiman, Dave; Faircloth, Jeremy Record Type: Book Extent: 1 online resource (232 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1357. Cult of the dead cow : how the original hacking supergroup might just save the world /: how the original hacking supergroup might just save the world. (2019) Authors: Menn, Joseph Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1358. Emerging security algorithms and techniques. (2019) Editors: Ahmad, Khaleel; Doja, M. N; Udzir, Nur Izura; Singh, Manu Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1359. Cybersecurity awareness among students and faculty. (2019) Authors: Moallem, Abbas Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1360. Managing cybersecurity risk. (2019) Editors: Reuvid, Jonathan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗