Your search returned 5 results.

1.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

2.
Anomaly detection as a service : challenges, advances, and opportunities / Danfeng Yao ... [et al.]

by Yao, Danfeng | EMO.

Publication details: Morgan and Claypool Publishers 2018Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Ano (1).

3.
Computer and internet security : a hands-on approach / Wenliang Du

by Du,Wenliang | EMO.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Duw (1).

4.
(The) security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll

by Landoll, Douglas J | EMO.

Edition: 3rd ed.Publication details: CRC Press 2021Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Lan (1).

5.
Managing risk in information systems / Darril Gibson, Andy Igonor

by Gibson, Darril | Igonor, Andy | EMO.

Edition: 3rd ed.Publication details: Jones & Bartlett Learning 2022Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 Gib (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha