671. Theory of Cryptography. 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings /: 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings. Part I : (2018) Editors: Beimel, Amos; Dziembowski, Stefan Other Names: Theory of Cryptography Conference, 16th Record Type: Book Extent: 1 online resource (xvii, 720 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
672. Medical imaging and its security in telemedicine applications. ([2019]) Authors: Thanki, Rohit; Borra, Surekha Record Type: Book Extent: 1 online resource (xi, 57 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
673. Mastering Reverse Engineering : Re-engineer your ethical hacking skills /: Re-engineer your ethical hacking skills. (2018) Authors: Wong, Reginald Record Type: Book Extent: 1 online resource (436 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
674. Database and expert systems applications. 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings /: 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings. Part II : ([2017]) Editors: Benslimane, Djamal; Damiani, Ernesto, 1960-; Grosky, William I; Hameurlain, Abdelkader; Sheth, A (Amit), 1959-; Wagner, Roland R Other Names: Database and Expert Systems Applications Conference, 28th Record Type: Book Extent: 1 online resource (xxiv, 461 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
675. Codes : the guide to secrecy from ancient to modern times /: the guide to secrecy from ancient to modern times. (2005) Other Names: Mollin, Richard A, 1947- Record Type: Book Extent: 1 online resource (xx, 678 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
676. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (2006) Other Names: Landoll, Douglas J Record Type: Book Extent: 1 online resource (xxi, 473 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
677. Database and expert systems applications. 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings /: 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings. Part I : ([2017]) Editors: Benslimane, Djamal; Damiani, Ernesto, 1960-; Grosky, William I; Hameurlain, Abdelkader; Sheth, A (Amit), 1959-; Wagner, Roland R Other Names: Database and Expert Systems Applications Conference, 28th Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
678. Cybersecurity lexicon. ([2016]) Authors: Ayala, Luis Record Type: Book Extent: 1 online resource (200 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
679. Future data and security engineering : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28-30, 2018, Proceedings /: 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28-30, 2018, Proceedings. (2018) Editors: Dang, Tran Khanh; Küng, Josef, 1962-; Wagner, Roland R; Thoai, Nam; Takizawa, Makoto Other Names: FDSE (Conference), 5th Record Type: Book Extent: 1 online resource (xiv, 500 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
680. Understanding social engineering based scams. (2016) Other Names: Jakobsson, Markus Record Type: Book Extent: 1 online resource (135 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗