191. Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem /: safeguard your system by making your machines intelligent using the Python ecosystem. (2018) Authors: Halder, Soma; Ozdemir, Sinan Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
192. Asset attack vectors : building effective vulnerability management strategies to protect organizations /: building effective vulnerability management strategies to protect organizations. (2018) Other Names: Haber, Morey J; Hibbert, Brad Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
193. Blockchain Developer's Guide : Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda /: Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda. (2018) Authors: Hill, Brenn; Chopra, Samanyu; Valencourt, Paul; Prusty, Narayan Record Type: Book Extent: 1 online resource (564 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
194. Learning Android Forensics : Analyze Android devices with the latest forensic tools and techniques, 2nd Edition /: Analyze Android devices with the latest forensic tools and techniques, 2nd Edition. (2018) Authors: Skulkin, Oleg; Tindall, Donnie; Tamma, Rohit Record Type: Book Extent: 1 online resource (328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
195. Open source intelligence methods and tools : a practical guide to online intelligence /: a practical guide to online intelligence. (2018) Authors: Hassan, Nihad A; Hijazi, Rami Record Type: Book Extent: 1 online resource (xxiii, 354 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
196. Personal cybersecurity : how to avoid and recover from cybercrime /: how to avoid and recover from cybercrime. ([2017]) Authors: Waschke, Marvin Record Type: Book Extent: 1 online resource (240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
197. Hands-On Enterprise Application Development with Python : Design data-intensive Application with Python 3 /: Design data-intensive Application with Python 3. (2018) Authors: Badhwar, Saurabh Record Type: Book Extent: 1 online resource (374 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
198. From database to cyber security : essays dedicated to Sushil Jajodia on the occasion of his 70th birthday /: essays dedicated to Sushil Jajodia on the occasion of his 70th birthday. (2018) Editors: Samarati, Pierangela; (Computer scientist), Ray, Indrajit; Ray, Indrakshi Other Names: Jajodia, Sushil honouree. Record Type: Book Extent: 1 online resource (xii, 487 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
199. IOS penetration testing : a definitive guide to iOS security /: a definitive guide to iOS security. (2016) Authors: Relan, Kunal Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
200. Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies /: a step-by-step guide to computer security for non-techies. (2018) Authors: Parker, Carey Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗