31. Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017) Authors: Schroeder, Jordan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
32. Building a comprehensive IT security program : practical guidelines and best practices /: practical guidelines and best practices. (2016) Authors: Wittkop, Jeremy Record Type: Book Extent: 1 online resource (xix, 195 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
33. Self- and co-regulation in cybercrime, cybersecurity and national security. (2015) Authors: Tropina, Tatiana; Callanan, Cormac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
34. Protecting privacy in data release. ([2015]) Authors: Livraga, Giovanni Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
35. Cyber denial, deception and counter deception : a framework for supporting active cyber defense /: a framework for supporting active cyber defense. (2015) Authors: Heckman, Kristin E; Stech, Frank J; Thomas, Roshan K; Schmoker, Ben; Tsow, Alexander W Record Type: Book Extent: 1 online resource (xv, 251 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
36. Multimedia forensics and security : foundations, innovations, and applications /: foundations, innovations, and applications. ([2017]) Editors: Hassanien, Aboul Ella Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
37. Future intelligent vehicular technologies : first International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised selected papers /: first International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised selected papers. (2017) Editors: Ferreira, Joaquim; (Scientist), Alam, Muhammad Other Names: Future 5V (Conference), 1st Record Type: Book Extent: 1 online resource (xv, 225 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
38. E-technologies : embracing the Internet of Things : 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings /: embracing the Internet of Things : 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings. (2017) Editors: Aïmeur, Esma; Ruhi, Umar; (Computer scientist), Weiss, Michael Other Names: International MCETECH Conference on e-Technologies, 7th Record Type: Book Extent: 1 online resource (xii, 319 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
39. Big data technologies for monitoring of computer security : a case study of the Russian Federation /: a case study of the Russian Federation. ([2018]) Other Names: Petrenko, Sergei Record Type: Book Extent: 1 online resource (xxvii, 249 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
40. IT security risk control management : an audit preparation plan /: an audit preparation plan. (©2016) Other Names: Pompon, Raymond Record Type: Book Extent: 1 online resource (328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗