Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Dhi/Poi : Principles of information systems security : text and cases / Gurpreet Dhillon     
      Principles of information systems security : text and cases / Gurpreet Dhillon MELB  Book 2006
005.8 Dip/Ids    
      Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini MELB, W'PONDS   Book 2008
      Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini MELB, W'PONDS   Book 2008
005.8 Dou/Nsc : Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos     
      Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos MELB  Book 2007
005.8 DRM/TIC 2005 : Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reihaneh Safavi-Naini, Moti Yung (eds.)     
      Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reiha MELB  Book 2006
005.8 Dua/Cai 2019 : Computer & internet security : a hands-on approach / Wenliang Du     
      Computer & internet security : a hands-on approach / Wenliang Du MELB  Book 2019
005.8 Dua/Dma : Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du     
      Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du MELB  Book 2010
005.8 Dul/Cti 2011 : CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney     
      CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney MELB, W'PONDS   Book 2011
005.8 Dun/Csa : Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty     
      Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty W'PONDS  Book 2008
005.8 Dun/Mma : Mobile malware attacks and defense / Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [and others]     
      Mobile malware attacks and defense / Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [and others] MELB  Book 2009
005.8 Dun/Pas    
      Power and security in the information age : investigating the role of the state in cyberspace / edited by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel MELB, W'PONDS   Book 2007
      Power and security in the information age : investigating the role of the state in cyberspace / edited by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel MELB, W'PONDS   Book 2007
005.8 Ear/Wsh : Wireless security handbook / Aaron E. Earle     
      Wireless security handbook / Aaron E. Earle W'PONDS  Book 2006
005.8 Eas/Csf : Computer security fundamentals / Chuck Easttom     
      Computer security fundamentals / Chuck Easttom W'PONDS  Book 2006
005.8 Eas/Nda : Network defense and countermeasures : principles and practices / Chuck Easttom     
      Network defense and countermeasures : principles and practices / Chuck Easttom W'PONDS  Book 2006
005.8 Edn/Res : Real 802.11 security : Wi-Fi protected access and 802.11i / Jon Edney and William A. Arbaugh     
      Real 802.11 security : Wi-Fi protected access and 802.11i / Jon Edney and William A. Arbaugh W'PONDS  Book 2004
005.8 Elb/Uaa    
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
2 additional entries    
005.8 End/Ida    
      Intrusion detection & prevention / Carl Endorf, Eugene Schultz, Jim Mellander MELB, W'PONDS   Book 2004
      Intrusion detection & prevention / Carl Endorf, Eugene Schultz, Jim Mellander MELB, W'PONDS   Book 2004
005.8 Eri/Hta : Hacking : the art of exploitation / Jon Erickson     
      Hacking : the art of exploitation / Jon Erickson MELB, W'PONDS   Book 2003
005.8 Ethre Ore/Eps    
      Ethereal : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez MELB, W'PONDS   Book 2004
      Ethereal : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez MELB, W'PONDS   Book 2004
005.8 Etr/Ics 2006 : Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings / Günter, Müller (Ed.)     
      Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings / Günter, Müller (Ed.) W'PONDS  Book 2006
005.8 Ett/Ise : Information security / edited by J.E. Ettinger     
      Information security / edited by J.E. Ettinger W'PONDS  Book 1993
005.8 Eur/Cse 2000 : Computer security--ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000 : proceedings / Frédéric Cuppens ... [and others] (eds.)     
      Computer security--ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000 : proceedings / Frédéric Cuppens ... [and others] (eds.) W'PONDS  Book 2000
005.8 Eur/Cse 2004 : Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds     
      Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds W'PONDS  Book 2004
005.8 Far/Fdi    
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
005.8 Fer/Tos    
      A taxonomy of security in Very large Scale networked RFID systems / Harinda Fernando and Jemal Abawajy MELB, WATERFT ADPML   Book 2009
      A taxonomy of security in Very large Scale networked RFID systems / Harinda Fernando and Jemal Abawajy MELB, WATERFT ADPML   Book 2009
005.8 Fet/Wai : Web and information security / Elena Ferrari and Bhavani Thuraisingham, editors     
      Web and information security / Elena Ferrari and Bhavani Thuraisingham, editors W'PONDS  Book 2006
005.8 FireWa Wel/Ecp    
      Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide / Dameon D. Welch-Abernathy MELB, W'PONDS   Book 2004
      Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide / Dameon D. Welch-Abernathy MELB, W'PONDS   Book 2004
005.8 Fos/Boa    
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel MELB, W'PONDS   Book 2005
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel MELB, W'PONDS   Book 2005
005.8 Fos/Wst : Writing security tools and exploits / James C. Foster, Vincent Liu     
      Writing security tools and exploits / James C. Foster, Vincent Liu MELB  Book 2006
005.8 Fri/Mds : Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried     
      Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried MELB  Book 2010
005.8 Fro/Ccv : The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost]     
      The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost] W'PONDS  Book 1989
005.8 Fuh/Msh : Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski     
      Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski W'PONDS  Book 2005
005.8 Fun/Itp : Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others]     
      Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others] W'PONDS  Book 2011
005.8 Fur/Mea : Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek     
      Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek W'PONDS  Book 2005
005.8 Fur/Sia : Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors     
      Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors MELB  Book 2008
005.8 Fut/Fss 2012 : Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others]     
      Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others] W'PONDS  Book 2012
005.8 Gal/Cse : Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe     
      Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe MELB  Book 2008
005.8 Gal/Phc : Protocol : how control exists after decentralization / Alexander R. Galloway     
      Protocol : how control exists after decentralization / Alexander R. Galloway W'PONDS  Book 2004
005.8 Gar/Pua : Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford     
      Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford MELB  Book 1996
005.8 Gar/Wsp : Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford     
      Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford W'PONDS  Book 2002
005.8 Geb/Sie : Security in embedded devices / Catherine H. Gebotys     
      Security in embedded devices / Catherine H. Gebotys W'PONDS  Book 2010
005.8 Ger/Hod : Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia     
      Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia MELB  Book 2008
005.8 Gho/Ecs : E-commerce security and privacy / edited by Anup K. Ghosh     
      E-commerce security and privacy / edited by Anup K. Ghosh W'PONDS  Book 2001
005.8 Gho/Nid : Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani     
      Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani MELB  Book 2010
005.8 Gil/Eg : An executive guide identity & access management / Alasdair Gilchrist     
      An executive guide identity & access management / Alasdair Gilchrist MELB  Book 2018
005.8 Gol/Cse : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann MELB  Book 1999
005.8 Gol/Cse 2006 : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann W'PONDS  Book 2006
005.8 Gol/Mcp : Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich     
      Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich MELB  Book 1999
005.8 Goo/Ite    
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
005.8 Goo/Tas    
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
005.8 Gor/Pds : Practical data security / edited by John Gordon     
      Practical data security / edited by John Gordon W'PONDS  Book 1993
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next