1451. Cybersecurity and high-performance computing environments : integrated innovations, practices, and applications /: integrated innovations, practices, and applications. (2022) Editors: Li, Kuan-Ching; Sukhija, Nitin; (Computer scientist), Bautista, Elizabeth; Gaudiot, Jean-Luc Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1452. Cybersecurity for business : organization-wide strategies to ensure cyber risk is not just an it issue /: organization-wide strategies to ensure cyber risk is not just an it issue. (2022) Editors: Clinton, Larry, 1951- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1453. Cybersecurity and local government. (2022) Authors: Norris, Donald F; Mateczun, Laura; Forno, Richard Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1454. Multimedia security. Authentication and data hiding / Volume 1, (2022) Authors: Puech, William Editors: Peuch, William Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1455. Hacking for dummies. (2022) Authors: Beaver, Kevin Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1456. Hacking in the humanities : cybersecurity, speculative fiction, and navigating a digital future /: cybersecurity, speculative fiction, and navigating a digital future. (2022) Authors: Mauro, Aaron Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1457. Cybersecurity for dummies. (2022) Authors: (Cybersecurity expert), Steinberg, Joseph Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1458. Azure Active Directory for secure application development : use modern authentication techniques to secure applications in Azure /: use modern authentication techniques to secure applications in Azure. (2022) Authors: Zaal, Sjoukje Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1459. Purple team strategies : enhancing global security posture through uniting red and blue teams with adversary emulation /: enhancing global security posture through uniting red and blue teams with adversary emulation. (2022) Authors: Routin, David; Rossier, Samuel; Thoores, Simon Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1460. Phishing detection using content-based image classification. (2022) Authors: Khandelwal, Shekhar; Das, Rik, 1978- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗