QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL
1985
1
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL
c2003
1
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL
c2007
1
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL
QA 76.9 A25 M5 : Cryptography decrypted / H.X. Mel, Doris M. Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.; BJL
2001
1
QA 76.9 A25 M6 : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon ; foreword by Steve Wozniak.; BJL
QA 76.9 A25 P3 : Information security risk analysis / Thomas R. Peltier.; BJL
c2001
1
QA76.9.A25 P33 2010 : Understanding cryptography [electronic resource] : a textbook for students and practitioners / Christof Paar, Jan Pelzl ; foreword by Bart Preneel.; Online materials
2010
1
QA 76.9 A25 P9 : The protection of computer software : its technology and applications / edited by D. Grover.; BJL