1381. A comprehensive guide to information security management and audit. (2023) Authors: Banoth, Rajkumar; Gugulothu, Narsimha; Godishala, Aruna Kranthi Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1382. Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks /: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks. (2022) Authors: Kleymenov, Alexey; Thabet, Amr Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1383. Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system /: attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system. (2022) Authors: Diogenes, Yuri; Ozkaya, Erdal Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1384. Lightweight cryptographic techniques and cybersecurity approaches. (2022) Editors: Ramakrishnan, Srinivasan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1385. Building a cyber resilient business : the cyber handbook for non-cyber executives /: the cyber handbook for non-cyber executives. (2022) Authors: Chelly, Magda; Tan, Shamane; Tran, Hai Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1386. Introduction to Computer Security. (2013) Authors: Goodrich, Michael; Tamassia, Roberto Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1387. Corporate computer security. ([2015]) Authors: Panko, Raymond R Other Names: Boyle, Randall Record Type: Book Extent: 1 online resource (672 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1388. Business data networks and security. ([2015]) Other Names: Panko, Raymond R; Panko, Julia L Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1389. Computer security : principles and practice /: principles and practice. ([2018]) Authors: Stallings, William; Brown, Lawrie Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1390. Citrix Access Gateway VPX 5.04 Essentials a Practical Step-by-Step Guide to Provide Secure Remote Access Using the Citrix Access Gateway VPX /: a Practical Step-by-Step Guide to Provide Secure Remote Access Using the Citrix Access Gateway VPX. (2013) Other Names: Mallett, Andrew Record Type: Book Extent: 1 online resource (vi, 217 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗