1 |
![An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments](Cover.cls?type=cover&isbn=9781801810210&size=100) |
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments [Reference Book]
|
Gunawardana, Kushantha
|
2022 |
|
Shelf Location: QA76.9.M65 G86 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
2 |
![Computer and network security essentials Computer and network security essentials](Cover.cls?type=cover&isbn=9783319584232&size=100) |
Computer and network security essentials [Reference Book]
|
Daimi, Kevin...
|
2017 |
|
Shelf Location: QA76.9.A25 D35 2017.
Available at: GUtech Library.
Number of Holdings: 1.
|
3 |
![](data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7) |
Concealing data in images using steganography techniques [Reference Book]
|
Ahmed Nasser Alriyami
|
2023 |
|
Shelf Location: Call number.
Available at: GUtech Library.
Number of Holdings: 1.
|
4 |
![Cryptography and network security. Cryptography and network security.](Cover.cls?type=cover&isbn=9789350141397&size=100) |
Cryptography and network security. [Reference Book]
|
Chaudhary, Vikas
|
2011 |
|
Shelf Location: QA76.9.A25 C43 2020.
Available at: GUtech Library.
Number of Holdings: 1.
|
5 |
![Cyber security Cyber security](Cover.cls?type=cover&isbn=9789350145968&size=100) |
Cyber security [Reference Book]
|
Pandey, O.N.
|
|
|
Shelf Location: QA76.9.A25 P36 2019.
Available at: GUtech Library.
Number of Holdings: 1.
|
6 |
![Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.](Cover.cls?type=cover&isbn=9789390684731&size=100) |
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. [Reference Book]
|
Goutam, Rajesh Kumar
|
2021 |
|
Shelf Location: QA76.9.A25 G68 2021.
Available at: GUtech Library.
Number of Holdings: 1.
|
7 |
![Fundamentals of information systems security Fundamentals of information systems security](Cover.cls?type=cover&isbn=9781284116458&size=100) |
Fundamentals of information systems security [Reference Book]
|
Kim, David
|
2018 |
|
Shelf Location: QA76.9.A25 K56 2018.
Available at: GUtech Library.
Number of Holdings: 1.
|
8 |
![IT auditing: using controls to protect information assets IT auditing: using controls to protect information assets](Cover.cls?type=cover&isbn=9781260453225&size=100) |
IT auditing: using controls to protect information assets [Reference Book]
|
Kegerreis, M.
|
2020 |
|
Shelf Location: QC100.K44 2020.
Available at: GUtech Library.
Number of Holdings: 9.
|
9 |
![Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence](Cover.cls?type=cover&isbn=9781803238302&size=100) |
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence [Reference Book]
|
Oettinger, William
|
2022 |
|
Shelf Location: QA76.9.A25 O38 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
10 |
![Machine learning and security: protecting systems with data and algorithms Machine learning and security: protecting systems with data and algorithms](Cover.cls?type=cover&isbn=9781491979907&size=100) |
Machine learning and security: protecting systems with data and algorithms [Reference Book]
|
Chio, Clarence
|
2018 |
|
Shelf Location: QA76.9.A25 C45 2018.
Available at: GUtech Library.
Number of Holdings: 1.
|
11 |
![Managing risk in information systems: Information system security & Assurance series Managing risk in information systems: Information system security & Assurance series](Cover.cls?type=cover&isbn=9781284183719&size=100) |
Managing risk in information systems: Information system security & Assurance series [Reference Book]
|
Gibson, Darryl
|
2022 |
|
Shelf Location: HD61.G53 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
12 |
![Mastering Python Data Visualization. Mastering Python Data Visualization.](Cover.cls?type=cover&isbn=9781783988334&size=100) |
Mastering Python Data Visualization. [E Book]
|
Raman, Kirthi
|
|
|
Available at: Ebook Central.
Number of Holdings: 1.
|
13 |
![Network security Network security](Cover.cls?type=cover&isbn=9789350142318&size=100) |
Network security [Reference Book]
|
Pandey, O.N.
|
2020 |
|
Shelf Location: QA76.9.A25 P36 2020.
Available at: GUtech Library.
Number of Holdings: 1.
|