Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher     
      Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher MELB  Book 2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon     
      The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon W'PONDS  Book 2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell     
      Trusted computing / edited by Chris Mitchell W'PONDS  Book 2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]     
      Computer and intrusion forensics / George Mohay ... [and others] W'PONDS  Book 2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]     
      Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others] W'PONDS  Book 2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney     
      Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney W'PONDS  Book 2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea     
      Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea W'PONDS  Book 2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)     
      Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.) W'PONDS  Book 2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]     
      Guide to computer forensics and investigations / Bill Nelson ... [and others] W'PONDS  Book 2006
005.8 Nel/Gtc 2008    
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] MELB, W'PONDS   Book 2008
2 additional entries    
005.8 Nel/Gtc 2010    
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
005.8 Nel/Gtc 2016    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
3 additional entries    
005.8 Nel/Gtc 2019    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
2 additional entries    
005.8 Netscr Cam/Cnf : Configuring NetScreen firewalls / Rob Cameron ... [and others]     
      Configuring NetScreen firewalls / Rob Cameron ... [and others] W'PONDS  Book 2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou     
      Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan     
      Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan MELB  Book 2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors     
      Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors W'PONDS  Book 2010
005.8 Nor/Inp    
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark MELB, W'PONDS   Book 2003
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark MELB, W'PONDS   Book 2003
005.8 Nor/Isa : Intrusion signatures and analysis / Stephen Northcutt ... [and others]     
      Intrusion signatures and analysis / Stephen Northcutt ... [and others] W'PONDS  Book 2001
005.8 Nor/Nid 2000 : Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan     
      Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan MELB  Book 2001
005.8 Opp/Asf : Authentication systems for secure networks / Rolf Oppliger     
      Authentication systems for secure networks / Rolf Oppliger W'PONDS  Book 1996
005.8 Opp/Iai : Internet and Intranet security / Rolf Oppliger     
      Internet and Intranet security / Rolf Oppliger W'PONDS  Book 1998
005.8 Osb/Htc    
      How to cheat at managing information security / Mark Osborne MELB, W'PONDS   Book 2006
      How to cheat at managing information security / Mark Osborne MELB, W'PONDS   Book 2006
005.8 Osh/Sic : Security in computer operating systems / G. O'Shea     
      Security in computer operating systems / G. O'Shea W'PONDS  Book 1991
005.8 Pai/Siw 2016 : Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)     
      Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds) W'PONDS  Book 2016
005.8 Pal/Aip : Authentication in public key encryption schemes / by Ana Palavestra     
      Authentication in public key encryption schemes / by Ana Palavestra MELB THESES  Book 2009
005.8 Pan/Cca    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
005.8 Pan/Cca 2010    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
005.8 Pan/Ptf : A performance testing framework for digital forensic tools / by Lei Pan     
      A performance testing framework for digital forensic tools / by Lei Pan W'PONDS THESES  Book 2007
005.8 Pap/Cip : Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi     
      Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi ONLINE, W'PONDS   E-journal 2008
005.8 Paq/Bcf : The business case for network security : advocacy, governance, and ROI / Catherine Paquet, Warren Saxe     
      The business case for network security : advocacy, governance, and ROI / Catherine Paquet, Warren Saxe W'PONDS  Book 2005
005.8 Par/Nse    
      Network security / Terry Pardoe, Gordon F. Snyder MELB, W'PONDS   Book 2005
      Network security / Terry Pardoe, Gordon F. Snyder MELB, W'PONDS   Book 2005
005.8 Pas/Sat    
      Swarming attacks / K. Pascoe and M. Warren MELB, WATERFT ADPML   Book 2002
      Swarming attacks / K. Pascoe and M. Warren MELB, WATERFT ADPML   Book 2002
005.8 Pat/Sos : Security of self-organizing networks : MANET, WSN, WMN, VANET / edited by Al-Sakib Khan Pathan     
      Security of self-organizing networks : MANET, WSN, WMN, VANET / edited by Al-Sakib Khan Pathan MELB  Book 2011
005.8 Pau/Rsc    
      RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra MELB, W'PONDS   Book 2012
      RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra MELB, W'PONDS   Book 2012
005.8 Pea/Tcp : Trusted computing platforms : TCPA technology in context / Siani Pearson, editor ... [and others]     
      Trusted computing platforms : TCPA technology in context / Siani Pearson, editor ... [and others] W'PONDS  Book 2002
005.8 Pei/Swa    
      Security warrior / Cyrus Peikari and Anton Chuvakin MELB, W'PONDS   Book 2004
      Security warrior / Cyrus Peikari and Anton Chuvakin MELB, W'PONDS   Book 2004
005.8 Pel/Isf : Information security fundamentals / Thomas R. Peltier, Justin Peltier, John Blackley     
      Information security fundamentals / Thomas R. Peltier, Justin Peltier, John Blackley MELB  Book 2005
005.8 Pel/Isp    
      Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier MELB, W'PONDS   Book 2001
      Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier MELB, W'PONDS   Book 2001
005.8 Pel/Isr : Information security risk analysis / Thomas R. Peltier     
      Information security risk analysis / Thomas R. Peltier MELB  Book 2001
005.8 Pel/Isr 2005 : Information security risk analysis / Thomas R. Peltier     
      Information security risk analysis / Thomas R. Peltier MELB  Book 2005
005.8 Pep/Ira 2014 : Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia     
      Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia MELB  Book 2014
005.8 Pet/Spa : Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.)     
      Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.) W'PONDS  Book 2007
005.8 Pfi/Iht 1999 : Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.)     
      Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.) W'PONDS  Book 2000
005.8 Pfl/Sic 2003 : Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB  Book 2003
005.8 Pfl/Sic 2006    
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
005.8 Pie/Emi : Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaþs, Andrzej Piegat     
      Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaþs, Andrzej Piegat W'PONDS  Book 2004
005.8 Pie/Eog : The effectiveness of graphical authentication : an exploratory study / by Justin D. Pierce     
      The effectiveness of graphical authentication : an exploratory study / by Justin D. Pierce W'PONDS THESES  Book 2006
005.8 Pin/Nsa    
      Network science and cybersecurity / Robinson E. Pino, editor MELB, W'PONDS   Book 2014
      Network science and cybersecurity / Robinson E. Pino, editor MELB, W'PONDS   Book 2014
005.8 Pip/Isp : Information security : protecting the global enterprise / Donald L. Pipkin     
      Information security : protecting the global enterprise / Donald L. Pipkin MELB  Book 2000
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next