1361. Handbook of multimedia information security : techniques and applications /: techniques and applications. ([2019]) Editors: (Of Jaypee University of Information Technology), Singh, Amit Kumar; (Of Indian Institute of Technology), Mohan, Anand Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1362. Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /: using snort and ethereal to master the 8 layers of an insecure network. (2006) Other Names: Gregg, Michael (Michael C.); (Information security professional), Watkins, Stephen Record Type: Book Extent: 1 online resource (481 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1363. Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten : Eine kompakte Einführung in die Praxis /: Eine kompakte Einführung in die Praxis. (2019) Authors: Hanschke, Inge Record Type: Book Extent: 1 online resource (86 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1364. Cyber-Sicherheit : Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung /: Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung. (2019) Authors: Pohlmann, Norbert Record Type: Book Extent: 1 online resource (594 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1365. The cybersecurity playbook : practical steps for every leader and employee : to make your organization more secure /: practical steps for every leader and employee : to make your organization more secure. (2019) Authors: Young, Christopher Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1366. Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies /: implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies. (2019) Authors: Parisi, Alessandro Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1367. The politics and technology of cyberspace. (2019) Authors: Steed, Danny Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1368. Advanced computing and systems for security. Volume nine (2020) Other Names: Chaki, Rituparna; Cortesi, Agostino, 1963-; (Computer scientist), Saeed, Khalid; Chaki, Nabendu; International Doctoral Symposium on Applied Computation and Security Systems, 6th Record Type: Book Extent: 1 online resource (117 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1369. Deep learning applications for cyber security. ([2019]) Editors: Alazab, Mamoun; Tang, MingJian Record Type: Book Extent: 1 online resource (xx, 246 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1370. We have root : even more advice from Schneier on security /: even more advice from Schneier on security. (2019) Authors: Schneier, Bruce, 1963- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗