|   | Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices | Alex Alexander | 364.168/A L E | 2022 | 
		|   | Alice & Bob learn application security | Tanya Janca | 005.3/J A N | 2021 | 
		|   | Security strategies in Windows platforms and applications | Michael G Solomon | 005.8/S O L | 2021 | 
		|   | Cryptography and network security | Joseph Alexander | 005.82/A L E | 2022 | 
		|   | Web Application Security : exploitation and countermeasures for modern web applications | Andrew Hoffman | 005.8/H O F | 2020 | 
		|   | Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core | Stephen Haunts | 003.54/H A U | 2019 | 
		|   | Hacking connected cars : tactics, techniques, and procedures | Alissa Knight | 629.046/K N I | 2020 | 
		|   | Cyber Security | Markus Mack | 005.8/M A C | 2021 | 
		|   | Cyber Laws Intellectual Property and E-Commerce Security | Michael Nash | 346.54048/N A S | 2021 | 
		|   | The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity | Phil Quade | 005.8/Q U A | 2019 | 
		|   | Promoting human security : ethical, normative and educational frameworks in Africa | Jo-Ansie Van Wyk | 361.77096/W Y K | 2007 | 
		|   | The security governance of regional organizations |  | 355.031/S E C | 2011 | 
		|   | The Routledge handbook of security studies |  | 355.033/R O U | 2010 | 
		|   | Staying alive : safety and security guidelines for humanitarian volunteers in conflict areas | David Lloyd Roberts | 363.34988/R O B | 1999 | 
		|   | Japan s Middle East security policy : theory and cases | Yukiko Miyagi | 355.033552/M I Y | 2008 | 
		|   | U.S. national security policy and strategy : documents and policy proposals | Sam C Sarkesian 
Robert A Vitas | 355.033573/S A R | 1988 | 
		|   | Microsoft® Windows server 2008 security resource kit | Jesper M Johansson | 005.8/J O H | 2008 | 
		|   | Middle East in world security policies |  | 327.1720956/M I D | 2002 | 
		|   | Education for rural people : the role of education, training and capacity development in poverty reduction and food security | David Acker 
Lavinia Gasperini | 305.26/A C K | 2009 | 
		|   | Selected papers presented at the International Conference on Human Security in the Arab States |  | 323.40956/I N T | 2007 | 
		|   | Decision support systems in facing food insecurity challenges | Abdul-Hamid Musa Barghouthi | 362.58/B A R | 2008 | 
		|   | Computer security | Dieter Gollmann | 005.8/G o l | 2011 | 
		|   | Information Assurance For The Enterprise:A Road map To Information Security | Cory Schow 
Dan Shoemaker | 005.8/S C H | 2007 | 
		|   | comptia security+TM:study guide | emmett Dulaney 
Chuck Easttom | 004.65/D U L | 2014 | 
		|   | NATO transformed:the alliance’s new roles in international security | David S. Yost | 355.03/Y O S | 2000 | 
		|   | English For Security And Military |  | 428 / E N G | 2011 | 
		|   | International Security:politics,policy,prospects | Michael E. Smith | 355.03 / S M I | 2010 | 
		|   | Terrorism and Homeland Security | Jonathan R White | 303.652 / W H I | 2009 | 
		|   | cyber Warfare: Techniques, Tactics and tools for security Practitioners | Jason Andress 
Steve winterfeld | 355.343 / A N D | 2011 | 
		|   | Turning point: the arab worlds marginalization and international security after 9/11 | dan Tschirgi | 355.03 / T S C | 2007 |