791. Vulnerability management. (©2010) Other Names: Foreman, Park Record Type: Book Extent: 1 online resource (xix, 332 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
792. Instant Burp Suite starter : get up and running with Burp Suite using this hands-on practical guide /: get up and running with Burp Suite using this hands-on practical guide. (2013) Other Names: Carettoni, Luca Record Type: Book Extent: 1 online resource (ii, 56 pages :), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
793. Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /: a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise. (2013) Other Names: Woody, Aaron Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
794. Android security : attacks and defenses /: attacks and defenses. (2013) Authors: Dubey, Abhishek; Misra, Anmol Record Type: Book Extent: 1 online resource (xx, 249 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
795. Information assurance : dependability and security in networked systems /: dependability and security in networked systems. (©2008) Other Names: Qian, Yi, 1962- Record Type: Book Extent: 1 online resource (xxxvii, 537 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
796. Microsoft Vista for IT security professionals. (©2007) Other Names: Piltzecker, Tony, 1975-; Chaffin, Larry Record Type: Book Extent: 1 online resource (xxvii, 625 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
797. Building a global information assurance program. (2003) Other Names: Curts, Raymond J; Campbell, Douglas E, 1954- Record Type: Book Extent: 1 online resource (xv, 406 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
798. Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them /: the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them. (2007) Other Names: Geisshirt, Kenneth; Hildebrandt, Ralf; Zhen, Huang; Kulkarni, Mithil Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
799. Intrusion detection networks : a key to collaborative security /: a key to collaborative security. ([2014]) Authors: Fung, Carol; Boutaba, Raouf Record Type: Book Extent: 1 online resource (xxii, 239 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
800. Power and security in the information age : investigating the role of the state in cyberspace /: investigating the role of the state in cyberspace. (2016) Editors: Dunn Cavelty, Myriam; Mauer, Victor; Krishna-Hensel, Sai Felicia Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗