Call Number (LC) Title Results
QA76.9.A25 R337 2010 Information security management : concepts and practice 1
QA76.9.A25 S352 2000 Secrets and lies : digital security in a networked world 1
QA76.9.A25 S687 2007 Applied cryptanalysis : breaking ciphers in the real world 1
QA76.9.A25 T57 2005 PC magazine fighting spyware, viruses, and malware 1
QA76.9.A25 T7355 2022 Securing the private sector : protecting US industry in pursuit of national security 1
QA76.9.A25 T763 2022 Exploring careers in cybersecurity and digital forensics 1
QA76.9.A25 V54 2009 The myths of security : what the computer security industry doesn't want you to know 1
QA76.9.A25 V85 2002 Cryptography : an introduction 1
QA76.9.A25 W553 2016 Cyber security awareness for accountants and CPAs 1
QA76.9.A43 A44 2010 v.1 Algorithms and theory of computation handbook 1
QA76.9.A43 A44 2010 v.2 Algorithms and theory of computation handbook 1
QA76.9.A43 C66 2012 Machine learning for hackers 1
QA76.9.A43 C685 2013 Algorithms unlocked 1
QA76.9.A43 H353 2008 Handbook of applied algorithms : solving scientific, engineering and practical problems 1
QA76.9.A43 K545 2014 Algorithm design 1
QA76.9.A43 M37 2009 Algorithms of the intelligent Web 1
QA76.9.A43 R45 2014 Relating system quality and software architecture 1
QA76.9.A73 B75 2001 Applying COM+ 1
QA76.9.A73 B79 2004 MIPS assembly language programming 1
QA76.9.A73 N528 2015 Building microservices : designing fine-grained systems 1