Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Pit/Ids    
      Intrusion detection systems : an overview of protection / A. Pitts & M. Warren MELB, WATERFT ADPML   Book 2000
      Intrusion detection systems : an overview of protection / A. Pitts & M. Warren MELB, WATERFT ADPML   Book 2000
005.8 Pol/Avt : Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others]     
      Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others] W'PONDS  Book 1995
005.8 Pom/Cac : Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others]     
      Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others] W'PONDS  Book 1990
005.8 Por/Git : Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others]     
      Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others] MELB  Book 2009
005.8 Pot/Ese : 802.11 security / Bruce Potter and Bob Fleck     
      802.11 security / Bruce Potter and Bob Fleck W'PONDS  Book 2002
005.8 Pou/Spe    
      Security + exam cram 2 lab manual / Don Poulton and Michael G. Solomon MELB, W'PONDS   Book 2005
      Security + exam cram 2 lab manual / Don Poulton and Michael G. Solomon MELB, W'PONDS   Book 2005
005.8 Pro/Pid    
      Practical intrusion detection handbook / Paul E. Proctor MELB, W'PONDS   Book 2001
      Practical intrusion detection handbook / Paul E. Proctor MELB, W'PONDS   Book 2001
005.8 Qia/Ias : Information assurance : dependability and security in networked systems / [edited by] Yi Qian ... [and others]     
      Information assurance : dependability and security in networked systems / [edited by] Yi Qian ... [and others] W'PONDS  Book 2008
005.8 Rad/Hos : Handbook of SCADA/control systems security / edited by Robert Radvanovsky, Jacob Brodsky     
      Handbook of SCADA/control systems security / edited by Robert Radvanovsky, Jacob Brodsky W'PONDS  Book 2013
005.8 Radius Has/Rad : RADIUS / Jonathan Hassell     
      RADIUS / Jonathan Hassell MELB  Book 2002
005.8 Raf/Asv : Applied security visualization / Rafael Marty     
      Applied security visualization / Rafael Marty MELB  Book 2009
005.8 Raj/Cir : Computer incident response and product security / Damir Rajnovic     
      Computer incident response and product security / Damir Rajnovic MELB  Book 2011
005.8 Ray/Sfa : Security framework and protocols for the internet of things / by Biblob Ray     
      Security framework and protocols for the internet of things / by Biblob Ray MELB THESES  CD-ROM 2015
005.8 Red/Sst : System survivability : the EASEL way / J. Redman and M.J. Warren     
      System survivability : the EASEL way / J. Redman and M.J. Warren WATERFT ADPML  Book 2003
005.8 Ree : Automatic data proceesing risk assessment / Susan K. Reed     
      Automatic data proceesing risk assessment / Susan K. Reed W'PONDS  Microform 1977
005.8 Reh/Ids    
      Intrusion detection systems with Snort : advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID / Rafeeq Ur Rehman MELB, W'PONDS   Book 2003
      Intrusion detection systems with Snort : advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID / Rafeeq Ur Rehman MELB, W'PONDS   Book 2003
005.8 Rei/Bfn    
      Biometrics for network security / Paul Reid MELB, W'PONDS   Book 2004
      Biometrics for network security / Paul Reid MELB, W'PONDS   Book 2004
005.8 Reu/Sob : The secure online business handbook : e-commerce, IT functionality & business continuity     
      The secure online business handbook : e-commerce, IT functionality & business continuity W'PONDS  Book 2004
005.8 Reu/Sob 2005 : The secure online business handbook : e-commerce, IT functionality & business continuity     
      The secure online business handbook : e-commerce, IT functionality & business continuity MELB  Book 2005
005.8 Ric/Aba : The Australian business assessment of computer user security : a national survey / Kelly Richards     
      The Australian business assessment of computer user security : a national survey / Kelly Richards ONLINE, W'PONDS   E-book 2009
005.8 Ric/Gtr : Geekonomics : the real cost of insecure software / David Rice     
      Geekonomics : the real cost of insecure software / David Rice W'PONDS  Book 2008
005.8 Ris/Bss : Bulletproof SSL and TLS / Ivan Ristić     
      Bulletproof SSL and TLS / Ivan Ristić MELB  Book 2014
005.8 Rit/Wos : Wireless operational security / John W. Rittinghouse, James F. Ransome     
      Wireless operational security / John W. Rittinghouse, James F. Ransome MELB  Book 2004
005.8 Roe/Sca : Scada / edited by Kevin Roebuck     
      Scada / edited by Kevin Roebuck W'PONDS  Book 2011
005.8 Rog/Sac : Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]     
      Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others] W'PONDS  Book 2004
005.8 Ros/Sws : Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy     
      Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy W'PONDS  Book 2004
005.8 Rot/Cta : Complexity theory and cryptology : an introduction to cryptocomplexity / Jörg Rothe     
      Complexity theory and cryptology : an introduction to cryptocomplexity / Jörg Rothe MELB  Book 2005
005.8 Rua/Pes : Platform embedded security technology revealed : safeguarding the future of computing with Intel embedded security and management engine / Xiaoyu Ruan     
      Platform embedded security technology revealed : safeguarding the future of computing with Intel embedded security and management engine / Xiaoyu Ruan MELB  Book 2014
005.8 Rub/Wss : Web security sourcebook / Aviel D. Rubin, Daniel Greer, Marcus J. Ranum     
      Web security sourcebook / Aviel D. Rubin, Daniel Greer, Marcus J. Ranum W'PONDS  Book 1997
005.8 Rup/Sgc : Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman     
      Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman W'PONDS  Book 2011
005.8 Rus/Csb : Computer security basics / Deborah Russell and G.T. Gangemi, Sr     
      Computer security basics / Deborah Russell and G.T. Gangemi, Sr MELB  Book 1991
005.8 Rya/Boc : Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov     
      Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov W'PONDS  Book 2005
005.8 Rya/Maa : The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe     
      The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe W'PONDS  Book 2001
005.8 Sac/Dof : Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa     
      Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa W'PONDS  Book 2011
005.8 Sal/Foc : Foundations of computer security / David Salomon     
      Foundations of computer security / David Salomon MELB  Book 2006
005.8 Sas/Sap : Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others]     
      Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others] W'PONDS  Book 2005
005.8 Sat/Mff    
      Management framework for corporate telecommunication and data centre information security / by Muhammad Manshad Satti W'PONDS THESES, WATERFT THESES   Book 2003
      Management framework for corporate telecommunication and data centre information security / by Muhammad Manshad Satti W'PONDS THESES, WATERFT THESES   Book 2003
005.8 Sca/Hen 2005 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz MELB  Book 2005
005.8 Sca/Hew 2011 : Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima     
      Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima MELB  Book 2011
005.8 Sch/Hct 2003 : Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [and others]     
      Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [and others] W'PONDS  Book 2003
005.8 Sch/Iaf : Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker     
      Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker W'PONDS  Book 2007
005.8 Sch/Irc : Incident response : computer forensics toolkit / Douglas Schweitzer     
      Incident response : computer forensics toolkit / Douglas Schweitzer W'PONDS  Book 2003
005.8 Sch/Lta : Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors     
      Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors W'PONDS  Book 2007
005.8 Sch/Pcl : Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt     
      Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt W'PONDS  Book 2006
005.8 Sch/Sal    
      Secrets and lies : digital security in a networked world / Bruce Schneier MELB, W'PONDS   Book 2000
      Secrets and lies : digital security in a networked world / Bruce Schneier MELB, W'PONDS   Book 2000
005.8 Sco/Vpn : Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin     
      Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin MELB  Book 1998
005.8 Seb/Cai    
      Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk MELB, W'PONDS   Book 1989
      Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk MELB, W'PONDS   Book 1989
005.8 Sec/Com 2014 v.2 : International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers     
      International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers MELB  Book 2015
005.8 Sec/Com 2015 : Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran (editors)     
      Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vin W'PONDS  Book 2015
005.8 Sen/Ima : Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.)     
      Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.) MELB  Book 2010
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next