Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones W'PONDS  Book 2006
005.8 Kam/Nsa    
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane     
      PC security and virus protection : the ongoing war against information sabotage / Pamela Kane W'PONDS  Book 1994
005.8 Kat/Itm    
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
005.8 Kau/Nsp 2002    
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner MELB, W'PONDS   Book 2002
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner MELB, W'PONDS   Book 2002
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]     
      Electronic commerce relationships : trust by design / Peter Keen ... [and others] W'PONDS  Book 2000
005.8 Kem/Wis : Wireless Internet security : architecture and protocols / James Kempf     
      Wireless Internet security : architecture and protocols / James Kempf MELB  Book 2008
005.8 Kim/Hpt    
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
005.8 Kim/Hpt 2018 : The hacker playbook 3 : practical guide to penetration testing / Peter Kim     
      The hacker playbook 3 : practical guide to penetration testing / Peter Kim DPD, MELB, W'PONDS   Book 2018
005.8 Kin/Sad : Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu     
      Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu MELB  Book 2001
005.8 Kin/Spt    
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
005.8 Kiz/Cns    
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
005.8 Kiz/Cns 2011    
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
005.8 Kiz/Gtc 2012 : A guide to computer network security / Joseph Migga Kizza     
      A guide to computer network security / Joseph Migga Kizza W'PONDS  Book 2012
005.8 Kna/Csa    
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp MELB, W'PONDS   Book 2009
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp MELB, W'PONDS   Book 2009
005.8 Kou/Pte : Payment technologies for E-commerce / Weidong Kou, [ed.]     
      Payment technologies for E-commerce / Weidong Kou, [ed.] MELB  Book 2003
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich W'PONDS  Book 1998
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich MELB  Book 2003
005.8 Kra/Itn : Introduction to network security / Neal Krawetz     
      Introduction to network security / Neal Krawetz MELB  Book 2007
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser     
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser MELB  Book 2002
005.8 Kru/Cpg    
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines MELB, W'PONDS   Book 2003
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines MELB, W'PONDS   Book 2003
005.8 Kru/Csa : Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines     
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines MELB  Book 2010
005.8 Kru/Ida : Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna     
      Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna MELB  Book 2005
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors MELB  Book 2013
005.8 Lar/Aws    
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens MELB, W'PONDS   Book 2000
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens MELB, W'PONDS   Book 2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi     
      Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi MELB  Book 2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon W'PONDS  Book 2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] MELB  Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] MELB  Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) W'PONDS  Book 2004
005.8 Linux Bau/Bss : Building secure servers with Linux / Michael D. Bauer     
      Building secure servers with Linux / Michael D. Bauer MELB  Book 2002
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell W'PONDS  Book 2000
005.8 Linux Zie/Lfi : Linux firewalls / Robert L. Ziegler, Carl B. Constantine     
      Linux firewalls / Robert L. Ziegler, Carl B. Constantine MELB  Book 2002
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd W'PONDS  Book 2003
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein W'PONDS  Book 2002
005.8 Mal/Hns : Hardening network security / John Mallery ... [and others]     
      Hardening network security / John Mallery ... [and others] MELB  Book 2005
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) W'PONDS  Book 2006
005.8 Man/Paa    
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
005.8 Mao/Mct    
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
005.8 Mat/Ehs : Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew     
      Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew MELB  Book 2003
005.8 May/Sct : Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis     
      Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis W'PONDS  Book 2008
005.8 Mcc/Hes 2009 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz MELB  Book 2009
005.8 Mcc/Poa    
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
005.8 Mcc/Wha : Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah     
      Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah W'PONDS  Book 2002
005.8 Mcn/Nsa : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2004
005.8 Mcn/Nsa 2008 : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2008
005.8 Mcn/Soc : Secrets of computer espionage : tactics and countermeasures / Joel McNamara     
      Secrets of computer espionage : tactics and countermeasures / Joel McNamara W'BOOL  Book 2003
005.8 Mer/Cgt : The complete guide to Internet security / Mark S. Merkow & James Breithaupt     
      The complete guide to Internet security / Mark S. Merkow & James Breithaupt W'PONDS  CD-ROM 2000
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next