811. Data protection : governance, risk management, and compliance /: governance, risk management, and compliance. (©2010) Other Names: Hill, David G (David Gary), 1943- Record Type: Book Extent: 1 online resource (xxv, 304 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
812. Information assurance architecture. (©2008) Other Names: Willett, Keith D Record Type: Book Extent: 1 online resource (xxix, 588 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
813. Circuits and systems for security and privacy. (2016) Editors: Sheikh, Farhana; Sousa, Leonel A (Leonel Augusto); Iniewski, Krzysztof, 1960- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
814. Underground : tales of hacking, madness and obsession on the electronic frontier /: tales of hacking, madness and obsession on the electronic frontier. (2011) Other Names: Assange, Julian; Dreyfus, Suelette Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
815. Learn pfSense 2.4 : Get up and running with Pfsense and all the core concepts to build firewall and routing solutions /: Get up and running with Pfsense and all the core concepts to build firewall and routing solutions. (2018) Authors: Zientara, David Record Type: Book Extent: 1 online resource (346 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
816. Hands-On Penetration Testing on Windows : Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis /: Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis. (2018) Authors: Bramwell, Phil Record Type: Book Extent: 1 online resource (452 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
817. Hands-On Cybersecurity for Architects : Plan and design robust security architectures /: Plan and design robust security architectures. (2018) Authors: Rerup, Neil; Aslaner, Milad Record Type: Book Extent: 1 online resource (346 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
818. Hands-On Spring Security 5 for Reactive Applications : Learn effective ways to secure your applications with Spring and Spring WebFlux /: Learn effective ways to secure your applications with Spring and Spring WebFlux. (2018) Authors: John, Tomcy Record Type: Book Extent: 1 online resource (268 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
819. Network Security with pfSense : Architect, deploy, and operate enterprise-grade firewalls /: Architect, deploy, and operate enterprise-grade firewalls. (2018) Authors: Aggarwal, Manuj Record Type: Book Extent: 1 online resource (152 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
820. Cognitive hack : the new battleground in cybersecurity ... the human mind /: the new battleground in cybersecurity ... the human mind. ([2017]) Authors: (Risk advisory consultant), Bone, James Record Type: Book Extent: 1 online resource (xxii, 181 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗