QA76.9.A25 R337 2010
|
Information security management : concepts and practice |
1 |
QA76.9.A25 S352 2000
|
Secrets and lies : digital security in a networked world |
1 |
QA76.9.A25 S687 2007
|
Applied cryptanalysis : breaking ciphers in the real world |
1 |
QA76.9.A25 T57 2005
|
PC magazine fighting spyware, viruses, and malware |
1 |
QA76.9.A25 T7355 2022
|
Securing the private sector : protecting US industry in pursuit of national security |
1 |
QA76.9.A25 T763 2022
|
Exploring careers in cybersecurity and digital forensics |
1 |
QA76.9.A25 V54 2009
|
The myths of security : what the computer security industry doesn't want you to know |
1 |
QA76.9.A25 V85 2002
|
Cryptography : an introduction |
1 |
QA76.9.A25 W553 2016
|
Cyber security awareness for accountants and CPAs |
1 |
QA76.9.A43 A44 2010 v.1
|
Algorithms and theory of computation handbook |
1 |
QA76.9.A43 A44 2010 v.2
|
Algorithms and theory of computation handbook |
1 |
QA76.9.A43 C66 2012
|
Machine learning for hackers |
1 |
QA76.9.A43 C685 2013
|
Algorithms unlocked |
1 |
QA76.9.A43 H353 2008
|
Handbook of applied algorithms : solving scientific, engineering and practical problems |
1 |
QA76.9.A43 K545 2014
|
Algorithm design |
1 |
QA76.9.A43 M37 2009
|
Algorithms of the intelligent Web |
1 |
QA76.9.A43 R45 2014
|
Relating system quality and software architecture |
1 |
QA76.9.A73 B75 2001
|
Applying COM+ |
1 |
QA76.9.A73 B79 2004
|
MIPS assembly language programming |
1 |
QA76.9.A73 N528 2015
|
Building microservices : designing fine-grained systems |
1 |