1611. Cloud computing security : foundations and challenges /: foundations and challenges. (2016) Editors: Vacca, John R Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1612. Introduction to modern cryptography. (2007) Other Names: Katz, Jonathan, 1974-; Lindell, Yehuda Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1613. Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide /: secure your Joomla! website from common security threats with this easy-to-use guide. (2008) Other Names: Canavan, Tom Record Type: Book Extent: 1 online resource (264 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1614. Cyber security for industrial control systems : from the viewpoint of close-loop /: from the viewpoint of close-loop. (2016) Editors: Cheng, Peng; Zhang, Heng; Chen, Jiming Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1615. SSL VPN : understanding, evaluating, and planning secure, Web-based remote access /: understanding, evaluating, and planning secure, Web-based remote access. (2005) Other Names: Steinberg, Joseph; Speed, Tim Record Type: Book Extent: 1 online resource (212 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1616. Digital watermarking and steganography : fundamentals and techniques /: fundamentals and techniques. (2007) Other Names: Shih, Frank Y Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1617. Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit. (2008) Other Names: Kubasiak, Ryan R; Morrissey, Sean; Varsalone, Jesse Record Type: Book Extent: 1 online resource (576 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1618. Securing Windows Server 2008 : prevent attacks from outside and inside your organization /: prevent attacks from outside and inside your organization. (2008) Other Names: Liu, Dale; Wisselink, Remco Record Type: Book Extent: 1 online resource (656 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1619. The official CHFI exam 312-49 study guide : for computer hacking forensics investigators.: for computer hacking forensics investigators. (2011) Other Names: Kleiman, Dave Record Type: Book Extent: 1 online resource (960 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1620. WarDriving & wireless penetration testing. (2006) Other Names: Hurley, Chris Record Type: Book Extent: 1 online resource (446 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗