1561. Next generation SSH2 implementation : securing data in motion /: securing data in motion. (2011) Other Names: Liu, Dale Record Type: Book Extent: 1 online resource (336 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1562. Compromised data : from social media to big data /: from social media to big data. (2015) Editors: Langlois, Ganaele; Redden, Joanna, 1975-; Elmer, Greg, 1967- Record Type: Book Extent: 1 online resource (ix, 284 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1563. Securing the internet of things. (2017) Authors: Li, Shancang; Xu, Li D Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1564. Secret history : the story of cryptology /: the story of cryptology. (2016) Other Names: Bauer, Craig P Record Type: Book Extent: 1 online resource (620 pages), (58 illustrations) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1565. Secure and resilient software development. (©2010) Other Names: Merkow, Mark S; Raghavan, Lakshmikanth Record Type: Book Extent: 1 online resource (xxiv, 368 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1566. Hack proofing your network. (©2002) Other Names: Ahmad, David R. Mirza; Russell, Ryan, 1969- Record Type: Book Extent: 1 online resource (xxxiv, 787 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1567. Security for service oriented architectures. (2014) Authors: (Telecommunications engineer), Williams, Walter Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1568. Safety of web applications : risks, encryption and handling vulnerabilities with PHP /: risks, encryption and handling vulnerabilities with PHP. (2017) Authors: Quinton, Éric Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1569. Cyber security : an introduction for non-technical managers /: an introduction for non-technical managers. (2016) Authors: Green, Jeremy Swinfen Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1570. Windows malware analysis essentials. (2015) Authors: Marak, Victor Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗