771. Profiling hackers : the science of criminal profiling as applied to the world of hacking /: the science of criminal profiling as applied to the world of hacking. (2008 ©2009) Other Names: Chiesa, Raoul, 1973-; Ducci, Stefania; Ciappi, Silvio, 1965- Record Type: Book Extent: 1 online resource (xxiii, 262 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
772. Information security management metrics : a definitive guide to effective security monitoring and measurement /: a definitive guide to effective security monitoring and measurement. (©2009) Authors: Brotby, W. Krag Record Type: Book Extent: 1 online resource (xix, 223 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
773. Moodle security : learn how to install and configure Moodle in the most secure way possible /: learn how to install and configure Moodle in the most secure way possible. (2011) Other Names: Miletić, Darko Record Type: Book Extent: 1 online resource (v, 185 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
774. Host integrity monitoring : using Osiris and Samhain /: using Osiris and Samhain. (©2005) Other Names: Wotring, Brian; Potter, Bruce Record Type: Book Extent: 1 online resource (xxvi, 421 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
775. Enhancing computer security with smart technology. (2006) Other Names: Vemuri, V. Rao Record Type: Book Extent: 1 online resource (xvii, 269 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
776. Data mining tools for malware detection. (©2012) Other Names: Masud, Mehedy; Khan, Latifur; Thuraisingham, Bhavani M Record Type: Book Extent: 1 online resource (xxx, 419 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
777. Understanding and applying cryptography and data security. (2008) Other Names: Elbirt, Adam J Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
778. Snort : IDS and IPS toolkit /: IDS and IPS toolkit. (©2007) Other Names: Beale, Jay; Baker, Andrew R; Esler, Joel Record Type: Book Extent: 1 online resource (xxxiv, 730 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
779. The Weakest Link : Why Your Employees Might Be Your Biggest Cyber Risk /: Why Your Employees Might Be Your Biggest Cyber Risk. (2016 copyright 2016) Authors: Mr, Swinfen Green, Jeremy; Professor, Dorey, Paul Record Type: Book Extent: 1 online resource (240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
780. Computer security literacy : staying safe in a digital world /: staying safe in a digital world. ([2013]) Authors: Jacobson, Douglas; Idziorek, Joseph Record Type: Book Extent: 1 online resource (344 pages), color illustrations, color map View Content: Available online (eLD content is only available in our Reading Rooms) ↗