Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Iee/Pis : Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California     
      Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California W'PONDS  Book 1997
005.8 Ifi : Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H. Finch and E. Graham Dougall     
      Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H. W'PONDS  Book 1984
005.8 Ifi/Csp 1993 : Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall     
      Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall W'PONDS  Book 1993
005.8 Ifi/Dsv : Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E. Landwehr     
      Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E W'PONDS  Book 1994
005.8 Ifi/Pwg 2007    
      The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad MELB, W'PONDS   Book 2008
      The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad MELB, W'PONDS   Book 2008
005.8 Ifi/Pwg 2008    
      Policies and research in identity management : first IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN '07), RSM Erasmus University, Rotterdam, The Netherlands, Octo W'PONDS  Book 2008
      The future of identity in the information society : 4th IFIP WG 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September 1-7, 2008, revised selected papers / Vashek Matyá W'PONDS  Book 2009
005.8 Ifi/Sac 1993 : Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and ashore at St. Peterburg, Russia, 12-17 August 1993 / edited by Richard Sizer ... [and others]     
      Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and asho W'PONDS  Book 1994
005.8 Int/Daa : Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edited by Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray     
      Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edit W'PONDS  Book 2004
005.8 Int/Iac 1997 : Information and communications security : first international conference, ICIS'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.)     
      Information and communications security : first international conference, ICIS'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.) W'PONDS  Book 1997
005.8 Int/Iac 1999 : Information and communication security : second international conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds     
      Information and communication security : second international conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds W'PONDS  Book 1999
005.8 Int/Isa : Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / Choonsik Park, Seongtaek Chee (eds.)     
      Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / Choonsik Park, Seongtaek Chee (eds.) W'PONDS  Book 2005
005.8 Int/Itc : Information technology, security techniques : code of practice for information security controls = Technologies de l'information - techniques de sécurité : code de bonne pratique pour le management de la sécurité de l'information / International Organization for Standardization     
      Information technology, security techniques : code of practice for information security controls = Technologies de l'information - techniques de sécurité : code de bonne pratique pour le management de W'PONDS  Book 2013
005.8 Int/Itg : Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization     
      Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Ito : Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire / International Organization for Standardization     
      Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire W'PONDS  Book 2014
005.8 Int/Itp : Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization     
      Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Itr : Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de l'information - exigences / International Organization for Standardization     
      Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de W'PONDS  Book 2013
005.8 Int/Its : Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security techniques]     
      Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security t W'PONDS  Book 2008
005.8 Int/Its 2012 : Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization for Standardization     
      Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization WATERFT  Book 2012
005.8 Int/Itu : Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuves numériques / International Organization for Standardization     
      Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acq W'PONDS  Book 2012
005.8 Int/Itv : Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization     
      Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Sip 2005 : Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)     
      Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.) W'PONDS  Book 2005
005.8 Intern Che/Fai : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin     
      Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin W'PONDS  Book 1994
005.8 Intern Che/Fai 2003 : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin     
      Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin MELB  Book 2003
005.8 ios Mil/Ihh    
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
005.8 Isc/Isc 2004 : Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.)     
      Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.) W'PONDS  Book 2004
005.8 Isc/Isc 2006 : Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.)     
      Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.) W'PONDS  Book 2006
005.8 Isd/Isa : Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.)     
      Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.) MELB  Book 2010
005.8 Iso/Csr 2019 : Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch (Eds.)     
      Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyn W'PONDS  Book 2019
005.8 Isp/Ecc 2005 : Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.)     
      Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.) W'PONDS  Book 2005
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)     
      Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.) W'PONDS  Book 1999
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)     
      Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) W'PONDS  Book 2000
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)     
      Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier MELB  Book 2009
005.8 Iti/Isc 2010 : Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings / Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.)     
      Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 procee MELB  Book 2010
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.) W'PONDS  Book 2004
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.) W'PONDS  Book 2005
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)     
      Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.) MELB  Book 2012
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge     
      Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge W'PONDS  Book 2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)     
      Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.) W'PONDS  Book 2005
005.8 Jac/Eis    
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs MELB, W'PONDS   Book 2011
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs MELB, W'PONDS   Book 2011
005.8 Jac/Itn    
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
005.8 Jaj/Csa    
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors MELB, W'PONDS   Book 2010
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors MELB, W'PONDS   Book 2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]     
      Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edi W'PONDS  Book 1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan     
      Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan W'PONDS  Book 2008
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski     
      Internet and intranet security management : risks and solutions / Lech Janczewski W'PONDS  Book 2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor     
      Optical and digital techniques for information security / Bahram Javidi, editor W'PONDS  Book 2005
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]     
      Java network security / Robert MacGregor ... [and others] W'PONDS  Book 1998
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks     
      Java security / Scott Oaks W'PONDS  Book 2001
005.8 Java Pis/Ejs : Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others]     
      Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others] MELB  Book 2004
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson     
      Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson W'PONDS  Book 2002
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones W'PONDS  Book 2006
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next