1421. Artificial immune system : applications in computer security /: applications in computer security. (2016) Authors: Tan, Ying, 1964- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1422. Engineering information security : the application of systems engineering concepts to achieve information assurance /: the application of systems engineering concepts to achieve information assurance. (2015) Authors: Jacobs, Stuart Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1423. Code of practice : cyber security for ships /: cyber security for ships. ([2017]) Authors: Boyes, Hugh; Isbell, Roy Other Names: Great Britain. Department for Transport, commissioning body.; Institution of Engineering and Technology, publishing. Record Type: Book Extent: 1 online resource (72 pages), illustrations (colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1424. Security and resilience in intelligent data-centric systems and communication networks. (2017) Editors: Ficco, Massimo; Palmieri, Francesco A. N Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1425. Facing cyber threats head on : protecting yourself and your business /: protecting yourself and your business. (2017) Authors: Minick, Brian Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1426. Open participatory security : unifying technology, citizens, and the state /: unifying technology, citizens, and the state. (2017) Authors: Lehrke, Jesse Paul Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1427. Essential skills for hackers. (2015) Authors: Cardwell, Kevin; Dalziel, Henry Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1428. Cyber security 2014 - policy priorities for the UK and Europe, 1st July 2014. ([2014?]) Other Names: Westminster eForum Keynote Seminar: Cyber security 2014 - policy priorities for the UK and Europe Record Type: Book Extent: 1 online resource (85 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1429. Why CISOs fail : the missing link in security management - and how to fix it /: the missing link in security management - and how to fix it. (2017) Authors: Engel, Barak Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1430. Cryptography and network security : principles and practice /: principles and practice. (2017) Authors: Stallings, William Record Type: Book Extent: 1 online resource (768 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗