Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg
MELB, W'PONDS
2011
Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg
MELB, W'PONDS
2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]
Security information and event management (SIEM) implementation / David R. Miller ... [and others]
MELB
Security in an IPv6 environment / Daniel Minoli, Jake Kouns
MELB, W'PONDS
2009
Security in an IPv6 environment / Daniel Minoli, Jake Kouns
MELB, W'PONDS
2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
MELB
2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon
The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon
W'PONDS
2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell
Trusted computing / edited by Chris Mitchell
W'PONDS
2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]
Computer and intrusion forensics / George Mohay ... [and others]
W'PONDS
2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]
Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]
W'PONDS
2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney
Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney
W'PONDS
2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
W'PONDS
2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
W'PONDS
2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]
Guide to computer forensics and investigations / Bill Nelson ... [and others]
W'PONDS
Configuring NetScreen firewalls / Rob Cameron ... [and others]
W'PONDS
2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
WATERFT ADPML
2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
MELB
2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
W'PONDS
Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark
MELB, W'PONDS
2003
Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark
MELB, W'PONDS
2003
005.8 Nor/Isa : Intrusion signatures and analysis / Stephen Northcutt ... [and others]
Intrusion signatures and analysis / Stephen Northcutt ... [and others]
W'PONDS
2001
005.8 Nor/Nid 2000 : Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan
Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan
MELB
2001
005.8 Opp/Asf : Authentication systems for secure networks / Rolf Oppliger
Authentication systems for secure networks / Rolf Oppliger
W'PONDS
1996
005.8 Opp/Iai : Internet and Intranet security / Rolf Oppliger
Internet and Intranet security / Rolf Oppliger
W'PONDS
How to cheat at managing information security / Mark Osborne
MELB, W'PONDS
2006
How to cheat at managing information security / Mark Osborne
MELB, W'PONDS
2006
005.8 Osh/Sic : Security in computer operating systems / G. O'Shea
Security in computer operating systems / G. O'Shea
W'PONDS
1991
005.8 Pai/Siw 2016 : Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)
Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)
W'PONDS
2016
005.8 Pal/Aip : Authentication in public key encryption schemes / by Ana Palavestra
Authentication in public key encryption schemes / by Ana Palavestra
MELB THESES