Results
|
1.
|
|
Image from Amazon.com
|
|
|
2.
|
|
Image from Amazon.com
|
|
|
3.
|
|
Image from Amazon.com
|
|
|
4.
|
|
Image from Amazon.com
|
|
|
5.
|
|
Image from Amazon.com
|
|
|
6.
|
|
Image from Amazon.com
|
|
|
7.
|
|
Image from Amazon.com
|
|
|
8.
|
|
Image from Amazon.com
|
|
|
9.
|
|
Image from Amazon.com
|
|
|
10.
|
|
Image from Amazon.com
|
|
|
11.
|
|
Image from Amazon.com
|
|
|
12.
|
|
Image from Amazon.com
|
Cyber security cryptography and machine learning : third International Symposium, CSCML 2018, Beer Sheva, Israel, June 27-28, 2019, proceedings / Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung (eds.) by Series: Publisher: Cham, Switzerland : Springer, ©2019Copyright date: ©2019
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9.A25 2019.
|
|
13.
|
|
Image from Amazon.com
|
|
|
14.
|
|
Image from Amazon.com
|
|
|
15.
|
|
Image from Amazon.com
|
|
|
16.
|
|
Image from Amazon.com
|
|
|
17.
|
|
Image from Amazon.com
|
Cybersecurity law / Jeff Kosseff. by
Edition: Second edition. Publisher: Hoboken : Wiley, ©2019
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf KF1263.C65 K67 2019.
|
|
18.
|
|
Image from Amazon.com
|
|
|
19.
|
|
Image from Amazon.com
|
|
|
20.
|
|
Image from Amazon.com
|
The architecture of cybersecurity : how general counsel, executives, and boards of directors can protect their information assets / James P. Farwell, Virginia N. Roddy, Yvonne Chalker, and Geoffrey C. Elkins ; introduction by Gary Elkins. by Copyright date: ©2017Publisher: Lafayette, LA : San Souci Books ; New Orleans, LA : Elkins, P.L.C., ©2017
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf HF5548.37 .F37 2017.
|