Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein W'PONDS  Book 2002
005.8 Mal/Hns : Hardening network security / John Mallery ... [and others]     
      Hardening network security / John Mallery ... [and others] MELB  Book 2005
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) W'PONDS  Book 2006
005.8 Man/Paa    
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
005.8 Mao/Mct    
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
005.8 Mat/Ehs : Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew     
      Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew MELB  Book 2003
005.8 May/Sct : Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis     
      Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis W'PONDS  Book 2008
005.8 Mcc/Hes 2009 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz MELB  Book 2009
005.8 Mcc/Poa    
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
005.8 Mcc/Wha : Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah     
      Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah W'PONDS  Book 2002
005.8 Mcn/Nsa : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2004
005.8 Mcn/Nsa 2008 : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2008
005.8 Mcn/Soc : Secrets of computer espionage : tactics and countermeasures / Joel McNamara     
      Secrets of computer espionage : tactics and countermeasures / Joel McNamara W'BOOL  Book 2003
005.8 Mer/Cgt : The complete guide to Internet security / Mark S. Merkow & James Breithaupt     
      The complete guide to Internet security / Mark S. Merkow & James Breithaupt W'PONDS  CD-ROM 2000
005.8 Mer/Isp    
      Information security : principles and practices / Mark Merkow, James Breithaupt MELB, W'PONDS   Book 2005
      Information security : principles and practices / Mark Merkow, James Breithaupt MELB, W'PONDS   Book 2005
005.8 Micnet Fre/Pns    
      Programming .NET security / Adam Freeman and Allen Jones MELB, W'PONDS   Book 2003
      Programming .NET security / Adam Freeman and Allen Jones MELB, W'PONDS   Book 2003
005.8 Mil/Bhp    
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk MELB, W'PONDS   Book 2005
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk MELB, W'PONDS   Book 2005
005.8 Mil/Its : Is it safe? : protecting your computer, your business, and yourself online / Michael Miller     
      Is it safe? : protecting your computer, your business, and yourself online / Michael Miller MELB  Book 2008
005.8 Mil/Sas 2011    
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg MELB, W'PONDS   Book 2011
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg MELB, W'PONDS   Book 2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]     
      Security information and event management (SIEM) implementation / David R. Miller ... [and others] MELB  Book 2011
005.8 Min/Sia    
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns MELB, W'PONDS   Book 2009
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns MELB, W'PONDS   Book 2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher     
      Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher MELB  Book 2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon     
      The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon W'PONDS  Book 2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell     
      Trusted computing / edited by Chris Mitchell W'PONDS  Book 2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]     
      Computer and intrusion forensics / George Mohay ... [and others] W'PONDS  Book 2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]     
      Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others] W'PONDS  Book 2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney     
      Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney W'PONDS  Book 2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea     
      Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea W'PONDS  Book 2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)     
      Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.) W'PONDS  Book 2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]     
      Guide to computer forensics and investigations / Bill Nelson ... [and others] W'PONDS  Book 2006
005.8 Nel/Gtc 2008    
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
2 additional entries    
005.8 Nel/Gtc 2010    
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
005.8 Nel/Gtc 2016    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
3 additional entries    
005.8 Nel/Gtc 2019    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
005.8 Netscr Cam/Cnf : Configuring NetScreen firewalls / Rob Cameron ... [and others]     
      Configuring NetScreen firewalls / Rob Cameron ... [and others] W'PONDS  Book 2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou     
      Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan     
      Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan MELB  Book 2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors     
      Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors W'PONDS  Book 2010
005.8 Nor/Inp    
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark MELB, W'PONDS   Book 2003
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark MELB, W'PONDS   Book 2003
005.8 Nor/Isa : Intrusion signatures and analysis / Stephen Northcutt ... [and others]     
      Intrusion signatures and analysis / Stephen Northcutt ... [and others] W'PONDS  Book 2001
005.8 Nor/Nid 2000 : Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan     
      Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan MELB  Book 2001
005.8 Opp/Asf : Authentication systems for secure networks / Rolf Oppliger     
      Authentication systems for secure networks / Rolf Oppliger W'PONDS  Book 1996
005.8 Opp/Iai : Internet and Intranet security / Rolf Oppliger     
      Internet and Intranet security / Rolf Oppliger W'PONDS  Book 1998
005.8 Osb/Htc    
      How to cheat at managing information security / Mark Osborne MELB, W'PONDS   Book 2006
      How to cheat at managing information security / Mark Osborne MELB, W'PONDS   Book 2006
005.8 Osh/Sic : Security in computer operating systems / G. O'Shea     
      Security in computer operating systems / G. O'Shea W'PONDS  Book 1991
005.8 Pai/Siw 2016 : Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)     
      Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds) W'PONDS  Book 2016
005.8 Pal/Aip : Authentication in public key encryption schemes / by Ana Palavestra     
      Authentication in public key encryption schemes / by Ana Palavestra MELB THESES  Book 2009
005.8 Pan/Cca    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
005.8 Pan/Cca 2010    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next