Limit Search Results
Author
Language
Format
Subject
50 Results Found Subscribe to search results
000000000000MAIN
Print
1. 
Cover image for CYBERSECURITY ESSENTIALS
2. 
Cover image for Information security analytics : finding security insights, patterns, and anomalies in big data
3. 
Cover image for Security policies and implementation issues
4. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
5. 
Cover image for Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data  : an excerpt from Malware Forensic Field Guide for Linux Systems
7. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
9. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives