| 
		Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices | 
		Alex Alexander  | 
		364.168/A L E	 | 
		2022 | 
	
		
		 
		 | 
		 Alice & Bob learn application security | 
		Tanya Janca  | 
		005.3/J A N | 
		2021 | 
	
		
		 
		 | 
		Security strategies in Windows platforms and applications | 
		Michael G Solomon  | 
		005.8/S O L | 
		2021 | 
	
		
		 
		 | 
		Cryptography and network security | 
		Joseph Alexander  | 
		005.82/A L E | 
		2022 | 
	
		
		 
		 | 
		Web Application Security : exploitation and countermeasures for modern web applications | 
		Andrew Hoffman  | 
		005.8/H O F | 
		2020 | 
	
		
		 
		 | 
		Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core | 
		Stephen Haunts  | 
		003.54/H A U | 
		2019 | 
	
		
		 
		 | 
		 Hacking connected cars : tactics, techniques, and procedures | 
		Alissa Knight  | 
		629.046/K N I | 
		2020 | 
	
		
		 
		 | 
		Cyber Security | 
		Markus Mack  | 
		005.8/M A C | 
		2021 | 
	
		
		 
		 | 
		Cyber Laws Intellectual Property and E-Commerce Security | 
		Michael Nash  | 
		346.54048/N A S | 
		2021 | 
	
		
		 
		 | 
		 The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity | 
		Phil Quade  | 
		005.8/Q U A | 
		2019 | 
	
		
		 
		 | 
		Promoting human security : ethical, normative and educational frameworks in Africa | 
		Jo-Ansie Van Wyk  | 
		361.77096/W Y K | 
		2007 | 
	
		
		 
		 | 
		The security governance of regional organizations | 
		 | 
		355.031/S E C | 
		2011 | 
	
		
		 
		 | 
		The Routledge handbook of security studies | 
		 | 
		355.033/R O U | 
		2010 | 
	
		
		 
		 | 
		 Staying alive : safety and security guidelines for humanitarian volunteers in conflict areas | 
		David Lloyd Roberts  | 
		363.34988/R O B | 
		1999 | 
	
		
		 
		 | 
		Japan s Middle East security policy : theory and cases | 
		Yukiko Miyagi  | 
		355.033552/M I Y | 
		2008 | 
	
		
		 
		 | 
		 U.S. national security policy and strategy : documents and policy proposals | 
		Sam C Sarkesian 
Robert A Vitas  | 
		355.033573/S A R | 
		1988 | 
	
		
		 
		 | 
		 Microsoft® Windows server 2008 security resource kit | 
		Jesper M Johansson  | 
		005.8/J O H | 
		2008 | 
	
		
		 
		 | 
		 Middle East in world security policies  | 
		 | 
		327.1720956/M I D | 
		2002 | 
	
		
		 
		 | 
		Education for rural people : the role of education, training and capacity development in poverty reduction and food security | 
		David Acker 
Lavinia Gasperini  | 
		305.26/A C K | 
		2009 | 
	
		
		 
		 | 
		Selected papers presented at the International Conference on Human Security in the Arab States | 
		 | 
		323.40956/I N T | 
		2007 | 
	
		
		 
		 | 
		Decision support systems in facing food insecurity challenges | 
		Abdul-Hamid Musa Barghouthi  | 
		362.58/B A R | 
		2008 | 
	
		
		 
		 | 
		Computer security | 
		Dieter Gollmann  | 
		005.8/G o l | 
		2011 | 
	
		
		 
		 | 
		Information Assurance For The Enterprise:A Road map To Information Security | 
		Cory Schow 
Dan Shoemaker  | 
		005.8/S C H | 
		2007 | 
	
		
		 
		 | 
		comptia security+TM:study guide | 
		emmett Dulaney 
Chuck Easttom  | 
		004.65/D U L | 
		2014 | 
	
		
		 
		 | 
		NATO transformed:the alliance’s new roles in international security | 
		David S. Yost  | 
		355.03/Y O S | 
		2000 | 
	
		
		 
		 | 
		English For Security And Military | 
		 | 
		428 / E N G | 
		2011 | 
	
		
		 
		 | 
		International Security:politics,policy,prospects | 
		Michael E. Smith  | 
		355.03 / S M I | 
		2010 | 
	
		
		 
		 | 
		Terrorism and Homeland Security | 
		Jonathan R White  | 
		303.652 / W H I | 
		2009 | 
	
		
		 
		 | 
		cyber Warfare: Techniques, Tactics and tools for security Practitioners | 
		Jason Andress 
Steve winterfeld  | 
		355.343 / A N D  | 
		2011 | 
	
		
		 
		 | 
		Turning point: the arab worlds marginalization and international security after 9/11 | 
		dan Tschirgi  | 
		355.03 / T S C  | 
		2007 |