Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Gar/Wsp : Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford     
      Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford W'PONDS  Book 2002
005.8 Geb/Sie : Security in embedded devices / Catherine H. Gebotys     
      Security in embedded devices / Catherine H. Gebotys W'PONDS  Book 2010
005.8 Ger/Hod : Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia     
      Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia MELB  Book 2008
005.8 Gho/Ecs : E-commerce security and privacy / edited by Anup K. Ghosh     
      E-commerce security and privacy / edited by Anup K. Ghosh W'PONDS  Book 2001
005.8 Gho/Nid : Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani     
      Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani MELB  Book 2010
005.8 Gil/Eg : An executive guide identity & access management / Alasdair Gilchrist     
      An executive guide identity & access management / Alasdair Gilchrist MELB  Book 2018
005.8 Gol/Cse : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann MELB  Book 1999
005.8 Gol/Cse 2006 : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann W'PONDS  Book 2006
005.8 Gol/Mcp : Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich     
      Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich MELB  Book 1999
005.8 Goo/Ite    
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
005.8 Goo/Tas    
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
005.8 Gor/Pds : Practical data security / edited by John Gordon     
      Practical data security / edited by John Gordon W'PONDS  Book 1993
005.8 Gra/Cse : Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson     
      Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson MELB  Book 2011
005.8 Gra/Scp    
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk MELB, W'PONDS   Book 2003
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk MELB, W'PONDS   Book 2003
005.8 Gre/Cis    
      Cissp guide to security essentials / Peter Gregory MELB, W'PONDS   Book 2010
      Cissp guide to security essentials / Peter Gregory MELB, W'PONDS   Book 2010
005.8 Gre/Hts    
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
005.8 Gre/Ins : Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim     
      Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim MELB  Book 2005
005.8 Gri/Vgt : Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors     
      Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors MELB  Book 2008
005.8 Gtu/Ddi : A Guide to understanding design documentation in trusted systems     
      A Guide to understanding design documentation in trusted systems W'PONDS  Book 1988
005.8 Gup/Hor    
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] MELB  Book 2009
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] MELB  Book 2009
      Handbook of research on emerging developments in data privacy / Manish Gupta, State University of New York Buffalo, USA MELB  Book 2015
005.8 Gup/Sap : Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors     
      Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors MELB  Book 2012
005.8 Gur/Hip : Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov     
      Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov W'PONDS  Book 2008
005.8 Had/Set : Social engineering : the art of human hacking / by Christopher Hadnagy     
      Social engineering : the art of human hacking / by Christopher Hadnagy MELB  Book 2011
005.8 Hal/Acc    
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert MELB, W'PONDS   Book 2011
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert MELB, W'PONDS   Book 2011
005.8 Har/Ghh : Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al]     
      Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al] MELB  Book 2005
005.8 Har/Mag : Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti     
      Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti W'PONDS  Book 2003
005.8 Har/Nsa : Network security : a practical approach / Jan L. Harrington     
      Network security : a practical approach / Jan L. Harrington MELB  Book 2005
005.8 Hau/Sec : Security+ / Kirk Hausman, Diane Barrett, Martin Weiss     
      Security+ / Kirk Hausman, Diane Barrett, Martin Weiss MELB  Book 2003
005.8 Haw/Sac : Security and control in information systems : a guide for business and accounting / Andrew Hawker     
      Security and control in information systems : a guide for business and accounting / Andrew Hawker MELB  Book 2000
005.8 Hay/Ism : IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden     
      IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden MELB  Book 2010
005.8 Him/Ish : Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma     
      Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma MELB  Book 2007
005.8 Hog/Esh    
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw MELB, W'PONDS   Book 2004
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw MELB, W'PONDS   Book 2004
005.8 Hol/Ise    
      Internet security / Greg Holden MELB, W'PONDS   Book 2003
      Internet security / Greg Holden MELB, W'PONDS   Book 2003
005.8 Hon/Kye 2004 : Know your enemy : learning about security threats / The Honeynet Project     
      Know your enemy : learning about security threats / The Honeynet Project MELB  Book 2004
005.8 Hru/Cva : Computer viruses and anti-virus warfare / Jan Hruska     
      Computer viruses and anti-virus warfare / Jan Hruska W'PONDS  Book 1990
005.8 Hus/Ica    
      Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby MELB, W'PONDS   Book 2004
      Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby MELB, W'PONDS   Book 2004
005.8 Hut/Iwc : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren     
      Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren MELB  Book 2001
005.8 Hys/Cii : Critical information infrastructures : resilience and protection / Maitland Hyslop     
      Critical information infrastructures : resilience and protection / Maitland Hyslop W'PONDS  Book 2007
005.8 Ico/Eap 2010 : Ethics and policy of biometrics : third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised selected papers / Ajay Kumar, David Zhang (eds.)     
      Ethics and policy of biometrics : third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised selected papers / A MELB  Book 2010
005.8 Ico/Ges 2008 : Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings / Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown (eds.)     
      Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings / Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown (eds.) MELB  Book 2008
005.8 Ico/Iss 2006 : Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / Aditya Bagchi, Vijayalakshmi Atluri (Eds.)     
      Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / Aditya Bagchi, Vijayalakshmi Atluri (Eds.) MELB  Book 2006
005.8 Ico/Nas 2015 : Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings / edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang     
      Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings / edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang MELB  Book 2015
005.8 Iee/Pis : Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California     
      Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California W'PONDS  Book 1997
005.8 Ifi : Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H. Finch and E. Graham Dougall     
      Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H. W'PONDS  Book 1984
005.8 Ifi/Csp 1993 : Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall     
      Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall W'PONDS  Book 1993
005.8 Ifi/Dsv : Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E. Landwehr     
      Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E W'PONDS  Book 1994
005.8 Ifi/Pwg 2007    
      The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad MELB, W'PONDS   Book 2008
      The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad MELB, W'PONDS   Book 2008
005.8 Ifi/Pwg 2008    
      Policies and research in identity management : first IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN '07), RSM Erasmus University, Rotterdam, The Netherlands, Octo W'PONDS  Book 2008
      The future of identity in the information society : 4th IFIP WG 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September 1-7, 2008, revised selected papers / Vashek Matyá W'PONDS  Book 2009
005.8 Ifi/Sac 1993 : Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and ashore at St. Peterburg, Russia, 12-17 August 1993 / edited by Richard Sizer ... [and others]     
      Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and asho W'PONDS  Book 1994
005.8 Int/Daa : Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edited by Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray     
      Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edit W'PONDS  Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next