441. Cybersecurity : the insights you need from Harvard Business Review

by Harvard Business Review.

Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
442. Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us

by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
443. Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10

by Nita, Stefania Loredana | Mihailescu, Marius Iulian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
444. Cybersecurity analytics

by Verma, Rakesh M | Marchette, David J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 005.8 VER] (1).
445. Ethical and secure computing : a concise module

by Kizza, Joseph Migga.

Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
446. If it's smart, it's vulnerable

by Hypponen, Mikko.

Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
447. NTP security : a quick-start guide

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).
448. Secure MultiParty Computation Against Passive Adversaries

by Choudhury, Ashish | Patra, Arpita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 005.8 CHO] (1).
449. Trusted cellular IoT devices : design ingredients and concepts

by Heins, Kersten.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
450. Big breaches : cybersecurity lessons for everyone

by Daswani, Neil | Elbayadi, Moudy.

Publisher: California : Apress, 2021Availability: Items available for loan: [Call number: 005.8 DAS] (1).
451. Introduction to cybersecurity : a multidisciplinary challenge

by Sharp, Robin.

Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 SHA] (1).
452. Understanding logic locking

by Zamiri Azar, Kimia | Mardani Kamali, Hadi | Farahmandi, Farimah | Tehranipoor, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2024Availability: Items available for loan: [Call number: 005.8 ZAM] (1).
453. Privacy-preserving computing for big data analytics and AI

by Chen, Kai | Yang, Qiang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).

Powered by Koha