|
441.
|
Cybersecurity : the insights you need from Harvard Business Review
by Harvard Business Review. Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
442.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|
|
443.
|
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
by Nita, Stefania Loredana | Mihailescu, Marius Iulian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
|
|
444.
|
Cybersecurity analytics
by Verma, Rakesh M | Marchette, David J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 005.8 VER] (1).
|
|
445.
|
Ethical and secure computing : a concise module
by Kizza, Joseph Migga. Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
446.
|
If it's smart, it's vulnerable
by Hypponen, Mikko. Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
|
|
447.
|
NTP security : a quick-start guide
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).
|
|
448.
|
Secure MultiParty Computation Against Passive Adversaries
by Choudhury, Ashish | Patra, Arpita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 005.8 CHO] (1).
|
|
449.
|
Trusted cellular IoT devices : design ingredients and concepts
by Heins, Kersten. Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
|
|
450.
|
Big breaches : cybersecurity lessons for everyone
by Daswani, Neil | Elbayadi, Moudy. Publisher: California : Apress, 2021Availability: Items available for loan: [Call number: 005.8 DAS] (1).
|
|
451.
|
Introduction to cybersecurity : a multidisciplinary challenge
by Sharp, Robin. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
452.
|
Understanding logic locking
by Zamiri Azar, Kimia | Mardani Kamali, Hadi | Farahmandi, Farimah | Tehranipoor, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2024Availability: Items available for loan: [Call number: 005.8 ZAM] (1).
|
|
453.
|
Privacy-preserving computing for big data analytics and AI
by Chen, Kai | Yang, Qiang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|