351. NTP security : a quick-start guide /: a quick-start guide. (2016) Authors: Liska, Allan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
352. Learn CentOS Linux network services. ([2016]) Authors: Vázquez, Antonio Record Type: Book Extent: 1 online resource (351 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
353. Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats /: how to build a successful cyberdefense program against advanced threats. ([2018]) Authors: Donaldson, Scott E; Siegel, Stanley G; Williams, Chris K; Aslam, Abdul Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
354. Handbook on data centers. (2015) Editors: Khan, Samee Ullah; Zomaya, Albert Y Record Type: Book Extent: 1 online resource (xiii, 1334 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
355. Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information /: using NIST 800-30 and CSF to secure protected health information. (2017) Authors: (Computer security expert), Thompson, Eric C Record Type: Book Extent: 1 online resource (297 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
356. Digital privacy and security using windows : a practical guide /: a practical guide. (2017) Authors: Hassan, Nihad A; Hijazi, Rami Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
357. Digital fingerprinting. ([2016]) Editors: Wang, Cliff; Gerdes, Ryan M; Guan, Yong; Kasera, Sneha Kumar Record Type: Book Extent: 1 online resource (189 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
358. Introductory computer forensics : a hands-on practical approach /: a hands-on practical approach. (2018) Authors: (Computer scientist), Lin, Xiaodong Record Type: Book Extent: 1 online resource (xxiii, 577 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
359. Become ITIL Foundation certified in 7 days : learning ITIL made simple with real-life examples /: learning ITIL made simple with real-life examples. (2017) Authors: Kaiser, Abhinav Krishna Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
360. Selected Readings in Cybersecurity. (2018) Other Names: Choi, Young B Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗