|
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices |
Alex Alexander |
364.168/A L E |
2022 |
|
Alice & Bob learn application security |
Tanya Janca |
005.3/J A N |
2021 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Cryptography and network security |
Joseph Alexander |
005.82/A L E |
2022 |
|
Web Application Security : exploitation and countermeasures for modern web applications |
Andrew Hoffman |
005.8/H O F |
2020 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |
|
Hacking connected cars : tactics, techniques, and procedures |
Alissa Knight |
629.046/K N I |
2020 |
|
Cyber Security |
Markus Mack |
005.8/M A C |
2021 |
|
Cyber Laws Intellectual Property and E-Commerce Security |
Michael Nash |
346.54048/N A S |
2021 |
|
The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity |
Phil Quade |
005.8/Q U A |
2019 |
|
Promoting human security : ethical, normative and educational frameworks in Africa |
Jo-Ansie Van Wyk |
361.77096/W Y K |
2007 |
|
The security governance of regional organizations |
|
355.031/S E C |
2011 |
|
The Routledge handbook of security studies |
|
355.033/R O U |
2010 |
|
Staying alive : safety and security guidelines for humanitarian volunteers in conflict areas |
David Lloyd Roberts |
363.34988/R O B |
1999 |
|
Japan s Middle East security policy : theory and cases |
Yukiko Miyagi |
355.033552/M I Y |
2008 |
|
U.S. national security policy and strategy : documents and policy proposals |
Sam C Sarkesian
Robert A Vitas |
355.033573/S A R |
1988 |
|
Microsoft® Windows server 2008 security resource kit |
Jesper M Johansson |
005.8/J O H |
2008 |
|
Middle East in world security policies |
|
327.1720956/M I D |
2002 |
|
Education for rural people : the role of education, training and capacity development in poverty reduction and food security |
David Acker
Lavinia Gasperini |
305.26/A C K |
2009 |
|
Selected papers presented at the International Conference on Human Security in the Arab States |
|
323.40956/I N T |
2007 |
|
Decision support systems in facing food insecurity challenges |
Abdul-Hamid Musa Barghouthi |
362.58/B A R |
2008 |
|
Computer security |
Dieter Gollmann |
005.8/G o l |
2011 |
|
Information Assurance For The Enterprise:A Road map To Information Security |
Cory Schow
Dan Shoemaker |
005.8/S C H |
2007 |
|
comptia security+TM:study guide |
emmett Dulaney
Chuck Easttom |
004.65/D U L |
2014 |
|
NATO transformed:the alliance’s new roles in international security |
David S. Yost |
355.03/Y O S |
2000 |
|
English For Security And Military |
|
428 / E N G |
2011 |
|
International Security:politics,policy,prospects |
Michael E. Smith |
355.03 / S M I |
2010 |
|
Terrorism and Homeland Security |
Jonathan R White |
303.652 / W H I |
2009 |
|
cyber Warfare: Techniques, Tactics and tools for security Practitioners |
Jason Andress
Steve winterfeld |
355.343 / A N D |
2011 |
|
Turning point: the arab worlds marginalization and international security after 9/11 |
dan Tschirgi |
355.03 / T S C |
2007 |