891. Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools /: perform data acquisition, digital investigation, and threat analysis using Kali Linux tools. (2017) Authors: Parasram, Shiva V. N Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
892. Discrete dynamical systems, chaotic machines, and applications to information security. (2013) Authors: Bahi, Jacques Mohcine; Guyeux, Christophe Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
893. Oracle identity management : governance, risk, and compliance architecture /: governance, risk, and compliance architecture. (©2008) Other Names: Pohlman, Marlin B Record Type: Book Extent: 1 online resource (xxix, 516 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
894. The executive MBA in information security. (©2010) Other Names: Jr, Trinckes, John J Record Type: Book Extent: 1 online resource (xxiv, 325 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
895. Investigator's guide to steganography. (2004) Other Names: Kipper, Gregory Record Type: Book Extent: 1 online resource (xix, 220 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
896. Instant OSSEC Host-based Intrusion Detection System. (2013) Other Names: Lhotsky, Brad Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
897. Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques /: enhance the security of your iOS platform and applications using iOS-centric security techniques. (2015) Authors: Banks, Allister; Jr, Edge, Charles S Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
898. Scene of the cybercrime. (©2008) Other Names: Cross, Michael, 1965-; Shinder, Debra Littlejohn Record Type: Book Extent: 1 online resource (xii, 732 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
899. Testing code security. (©2007) Other Names: Van der Linden, Maura A Record Type: Book Extent: 1 online resource (xxiii, 303 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
900. Building an information security awareness program. (©2002) Other Names: Desman, Mark B Record Type: Book Extent: 1 online resource (xvi, 251 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗