Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)  1999 1
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)  2000 1
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)  2009 1
005.8 Iti/Isc 2010 : Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings / Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.)  2010 1
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)  2004 1
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)  2005 1
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)  2012 1
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge  2012 1
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)  2005 1
005.8 Jac/Eis   2
005.8 Jac/Itn   2
005.8 Jaj/Csa   2
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]  1997- 1
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan  2008 1
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski  2000 1
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor  2005 1
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]  1998 1
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks  2001 1
005.8 Java Pis/Ejs : Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others]  2004 1
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson  2002 1
005.8 Jon/Ifo : Internet forensics / Robert Jones  2006 1
005.8 Kam/Nsa   2
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane  1994 1
005.8 Kat/Itm   2
005.8 Kau/Nsp 2002   2
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]  2000 1
005.8 Kem/Wis : Wireless Internet security : architecture and protocols / James Kempf  2008 1
005.8 Kim/Hpt   2
005.8 Kim/Hpt 2018 : The hacker playbook 3 : practical guide to penetration testing / Peter Kim  2018 1
005.8 Kin/Sad : Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu  2001 1
005.8 Kin/Spt   2
005.8 Kiz/Cns   3
005.8 Kiz/Cns 2011   3
005.8 Kiz/Gtc 2012 : A guide to computer network security / Joseph Migga Kizza  2012 1
005.8 Kna/Csa   2
005.8 Kou/Pte : Payment technologies for E-commerce / Weidong Kou, [ed.]  2003 1
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich  1998 1
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich  2003 1
005.8 Kra/Itn : Introduction to network security / Neal Krawetz  2007 1
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser  2002 1
005.8 Kru/Cpg   2
005.8 Kru/Csa : Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines  2010 1
005.8 Kru/Ida : Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna  2005 1
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors  2013 1
005.8 Lar/Aws   2
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi  2008 1
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon  2007 1
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]  2009 1
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li  2009 1
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]  2011 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next