1 |
![A practitioner's guide to cybersecurity and data protection: how to ensure client confidentiality A practitioner's guide to cybersecurity and data protection: how to ensure client confidentiality](Cover.cls?type=cover&isbn=9781032427607&size=100) |
A practitioner's guide to cybersecurity and data protection: how to ensure client confidentiality [Reference Book]
|
Knibbs,Catherine
|
2024 |
|
Shelf Location: QA76.9.A25 K55 2024.
Available at: GUtech Library.
Number of Holdings: 1.
|
2 |
![An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments](Cover.cls?type=cover&isbn=9781801810210&size=100) |
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments [Reference Book]
|
Gunawardana, Kushantha
|
2022 |
|
Shelf Location: QA76.9.M65 G86 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
3 |
![Computer and network security essentials Computer and network security essentials](Cover.cls?type=cover&isbn=9783319584232&size=100) |
Computer and network security essentials [Reference Book]
|
Daimi, Kevin...
|
2017 |
|
Shelf Location: QA76.9.A25 D35 2017.
Available at: GUtech Library.
Number of Holdings: 1.
|
4 |
![](data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7) |
Concealing data in images using steganography techniques [Reference Book]
|
Ahmed Nasser Alriyami
|
2023 |
|
Shelf Location: Call number.
Available at: GUtech Library.
Number of Holdings: 1.
|
5 |
![Cryptography and network security. Cryptography and network security.](Cover.cls?type=cover&isbn=9789350141397&size=100) |
Cryptography and network security. [Reference Book]
|
Chaudhary, Vikas
|
2011 |
|
Shelf Location: QA76.9.A25 C43 2020.
Available at: GUtech Library.
Number of Holdings: 1.
|
6 |
![Cyber security Cyber security](Cover.cls?type=cover&isbn=9789350145968&size=100) |
Cyber security [Reference Book]
|
Pandey, O.N.
|
|
|
Shelf Location: QA76.9.A25 P36 2019.
Available at: GUtech Library.
Number of Holdings: 1.
|
7 |
![Cybercrime and cybersecurity Cybercrime and cybersecurity](Cover.cls?type=cover&isbn=9781032524511&size=100) |
Cybercrime and cybersecurity [Reference Book]
|
Watters, Paul A.
|
2024 |
|
Shelf Location: QA76.9.A25 W38 2024.
Available at: GUtech Library.
Number of Holdings: 1.
|
8 |
![Cybersecurity and Identity Access Management Cybersecurity and Identity Access Management](Cover.cls?type=cover&isbn=9789811926600&size=100) |
Cybersecurity and Identity Access Management [Reference Book]
|
S. Rawal,Bharat
|
2023 |
|
Shelf Location: QA76.9.A25 R39 2023.
Available at: GUtech Library.
Number of Holdings: 1.
|
9 |
![Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.](Cover.cls?type=cover&isbn=9789390684731&size=100) |
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. [Reference Book]
|
Goutam, Rajesh Kumar
|
2021 |
|
Shelf Location: QA76.9.A25 G68 2021.
Available at: GUtech Library.
Number of Holdings: 1.
|
10 |
![Cybersecurity of digital service chains: challenges, methodologies, and tools Cybersecurity of digital service chains: challenges, methodologies, and tools](Cover.cls?type=cover&isbn=9783031040351&size=100) |
Cybersecurity of digital service chains: challenges, methodologies, and tools [Reference Book]
|
KoĆodziej,Joanna
|
2022 |
|
Shelf Location: QA76.9.A25 K65 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
11 |
![Fundamentals of information systems security Fundamentals of information systems security](Cover.cls?type=cover&isbn=9781284116458&size=100) |
Fundamentals of information systems security [Reference Book]
|
Kim, David
|
2018 |
|
Shelf Location: QA76.9.A25 K56 2018.
Available at: GUtech Library.
Number of Holdings: 1.
|
12 |
![Introduction to cybersecurity: a multidisciplinary challenge Introduction to cybersecurity: a multidisciplinary challenge](Cover.cls?type=cover&isbn=9783031414626&size=100) |
Introduction to cybersecurity: a multidisciplinary challenge [Reference Book]
|
Sharp, Robin
|
2024 |
|
Shelf Location: QA76.9.A25 H37 2024.
Available at: GUtech Library.
Number of Holdings: 1.
|
13 |
![IT auditing: using controls to protect information assets IT auditing: using controls to protect information assets](Cover.cls?type=cover&isbn=9781260453225&size=100) |
IT auditing: using controls to protect information assets [Reference Book]
|
Kegerreis, M.
|
2020 |
|
Shelf Location: QC100.K44 2020.
Available at: GUtech Library.
Number of Holdings: 9.
|
14 |
![Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence](Cover.cls?type=cover&isbn=9781803238302&size=100) |
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence [Reference Book]
|
Oettinger, William
|
2022 |
|
Shelf Location: QA76.9.A25 O38 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
15 |
![Machine learning and security: protecting systems with data and algorithms Machine learning and security: protecting systems with data and algorithms](Cover.cls?type=cover&isbn=9781491979907&size=100) |
Machine learning and security: protecting systems with data and algorithms [Reference Book]
|
Chio, Clarence
|
2018 |
|
Shelf Location: QA76.9.A25 C45 2018.
Available at: GUtech Library.
Number of Holdings: 1.
|
16 |
![Managing risk in information systems: Information system security & Assurance series Managing risk in information systems: Information system security & Assurance series](Cover.cls?type=cover&isbn=9781284183719&size=100) |
Managing risk in information systems: Information system security & Assurance series [Reference Book]
|
Gibson, Darryl
|
2022 |
|
Shelf Location: HD61.G53 2022.
Available at: GUtech Library.
Number of Holdings: 1.
|
17 |
![Mastering Python Data Visualization. Mastering Python Data Visualization.](Cover.cls?type=cover&isbn=9781783988334&size=100) |
Mastering Python Data Visualization. [E Book]
|
Raman, Kirthi
|
|
|
Available at: Ebook Central.
Number of Holdings: 1.
|
18 |
![Network security Network security](Cover.cls?type=cover&isbn=9789350142318&size=100) |
Network security [Reference Book]
|
Pandey, O.N.
|
2020 |
|
Shelf Location: QA76.9.A25 P36 2020.
Available at: GUtech Library.
Number of Holdings: 1.
|