211. CentOS Quick Start Guide : Get up and running with CentOS server administration /: Get up and running with CentOS server administration. (2018) Authors: Kalkhanda, Shiwang Record Type: Book Extent: 1 online resource (320 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
212. The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /: Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?. (2018) Authors: Lysne, Olav Record Type: Book Extent: 1 online resource (xiv, 116 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
213. Becoming the hacker : the playbook for getting inside the mind of an attacker /: the playbook for getting inside the mind of an attacker. (2019) Authors: Pruteanu, Adrian Record Type: Book Extent: 1 online resource (405 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
214. Learning Python for Forensics : Leverage the power of Python in forensic investigations, 2nd Edition /: Leverage the power of Python in forensic investigations, 2nd Edition. (2019) Authors: Miller, Preston; Bryce, Chapin Record Type: Book Extent: 1 online resource (476 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
215. Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps /: tools and techniques for automated security scanning and testing in DevSecOps. (2019) Authors: Hsu, Tony Hsiang-Chih Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
216. Hands-On Cybersecurity for Finance : Identify vulnerabilities and secure your financial services from security breaches /: Identify vulnerabilities and secure your financial services from security breaches. (2019) Authors: Dr, Ozkaya, Erdal; Aslaner, Milad Record Type: Book Extent: 1 online resource (308 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
217. Introduction to intelligent surveillance : surveillance data capture, transmission, and analytics /: surveillance data capture, transmission, and analytics. (2019) Authors: Yan, Wei Qi Record Type: Book Extent: 1 online resource (xiii, 222 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
218. Understanding new security threats. (2019) Editors: Gueldry, Michel R; Gokcek, Gigi; Hebron, Lui Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
219. The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context. Issue 3 (2nd July 2016) Authors: Liu, Zhan; Shan, Jialu; Pigneur, Yves Journal: Journal of information privacy & security Issue: Volume 12:Issue 3(2016) Page Start: 123 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
220. Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection. Issue 3 (2nd July 2016) Authors: Montaquila, Julian M.; Godwin, Cierra N. Journal: Journal of information privacy & security Issue: Volume 12:Issue 3(2016) Page Start: 145 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗