1601. Be cyber secure : tales, tools and threats /: tales, tools and threats. (2019) Authors: Reuvid, Jonathan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1602. Microsoft 365 Mobility and Security – Exam Guide MS-101 : Explore threat management, governance, security, compliance, and device services in Microsoft 365 /: Explore threat management, governance, security, compliance, and device services in Microsoft 365. (2019) Authors: Chamberlain, Nate Record Type: Book Extent: 1 online resource (312 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1603. Data hiding techniques in Windows OS : a practical approach to investigation and defense /: a practical approach to investigation and defense. (2016) Authors: Hassan, Nihad Ahmad; Hijazi, Rami Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1604. Information hiding in communication networks : fundamentals, mechanisms, and applications /: fundamentals, mechanisms, and applications. (2016) Authors: Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1605. BigNum math : implementing cryptographic multiple precision arithmetic /: implementing cryptographic multiple precision arithmetic. (2006) Other Names: St. Denis, Tom; Rose, Greg Record Type: Book Extent: 1 online resource (291 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1606. Cyber security culture : counteracting cyber threats through organizational learning and training /: counteracting cyber threats through organizational learning and training. (2016) Other Names: Trim, Peter R. J; Upton, David, 1949- Record Type: Book Extent: 1 online resource (234 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1607. Operating system forensics. (2015) Authors: Messier, Ric Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1608. Securing cyber-physical systems. (2015) Editors: Pathan, Al-Sakib Khan Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1609. Information theft prevention : theory and practice /: theory and practice. (2016) Authors: Okeke, Romanus Izuchukwu; Shah, Mahmood, 1971- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1610. Spring security essentials. (2016) Authors: Nachimuthu, Nanda Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗