Skip to main content
Search using this query type:
Keyword
Boolean
Exact match
Search only these record types:
Item
File
Collection
Advanced Search (Items only)
Search
Home
Browse Items
Browse Collections
Collection Tree
GCTU Library
GCTU Home
Contact Us
Browse Items (358 total)
Browse All
Search Items
Collection: Faculty of Computing and Information Systems
Previous Page
of 36
Next Page
Sort by:
Title
Creator
Date Added
Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Oracle Database 12c Security
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
The Manager’s Guide to Web Application Security A Concise Guide to the Weaker Side of the Web
Hacking web apps: detecting and preventing web application security problems
Web Application Security, A Beginner's Guide
Computer, Network, Software, and Hardware Engineering with Applications
Previous Page
of 36
Next Page
Output Formats
atom
,
dcmes-xml
,
json
,
omeka-xml
,
rss2