Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Rup/Sgc : Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman     
      Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman W'PONDS  Book 2011
005.8 Rus/Csb : Computer security basics / Deborah Russell and G.T. Gangemi, Sr     
      Computer security basics / Deborah Russell and G.T. Gangemi, Sr MELB  Book 1991
005.8 Rya/Boc : Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov     
      Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov W'PONDS  Book 2005
005.8 Rya/Maa : The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe     
      The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe W'PONDS  Book 2001
005.8 Sac/Dof : Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa     
      Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa W'PONDS  Book 2011
005.8 Sal/Foc : Foundations of computer security / David Salomon     
      Foundations of computer security / David Salomon MELB  Book 2006
005.8 Sas/Sap : Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others]     
      Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others] W'PONDS  Book 2005
005.8 Sat/Mff    
      Management framework for corporate telecommunication and data centre information security / by Muhammad Manshad Satti W'PONDS THESES, WATERFT THESES   Book 2003
      Management framework for corporate telecommunication and data centre information security / by Muhammad Manshad Satti W'PONDS THESES, WATERFT THESES   Book 2003
005.8 Sca/Hen 2005 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz MELB  Book 2005
005.8 Sca/Hew 2011 : Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima     
      Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima MELB  Book 2011
005.8 Sch/Hct 2003 : Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [and others]     
      Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [and others] W'PONDS  Book 2003
005.8 Sch/Iaf : Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker     
      Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker W'PONDS  Book 2007
005.8 Sch/Irc : Incident response : computer forensics toolkit / Douglas Schweitzer     
      Incident response : computer forensics toolkit / Douglas Schweitzer W'PONDS  Book 2003
005.8 Sch/Lta : Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors     
      Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors W'PONDS  Book 2007
005.8 Sch/Pcl : Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt     
      Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt W'PONDS  Book 2006
005.8 Sch/Sal    
      Secrets and lies : digital security in a networked world / Bruce Schneier MELB, W'PONDS   Book 2000
      Secrets and lies : digital security in a networked world / Bruce Schneier MELB, W'PONDS   Book 2000
005.8 Sco/Vpn : Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin     
      Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin MELB  Book 1998
005.8 Seb/Cai    
      Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk MELB, W'PONDS   Book 1989
      Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk MELB, W'PONDS   Book 1989
005.8 Sec/Com 2014 v.2 : International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers     
      International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers MELB  Book 2015
005.8 Sec/Com 2015 : Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran (editors)     
      Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vin W'PONDS  Book 2015
005.8 Sen/Ima : Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.)     
      Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.) MELB  Book 2010
005.8 Ser/Nar : Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi     
      Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi W'PONDS  Book 2006
005.8 Ser/Qca : Quantum communications and cryptography / edited by Alexander V. Sergienko     
      Quantum communications and cryptography / edited by Alexander V. Sergienko W'PONDS  Book 2006
005.8 She/Pfs : Protocols for secure electronic commerce / Mostafa Hashem Sherif     
      Protocols for secure electronic commerce / Mostafa Hashem Sherif MELB  Book 2000
005.8 Shi/Dwa : Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih     
      Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih W'PONDS  Book 2008
005.8 Shi/Sot    
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor MELB, W'PONDS   Book 2002
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor MELB, W'PONDS   Book 2002
005.8 Sho/Rmo : Risk management : objectives, policies & procedures / delivered by Blake Shorthouse     
      Risk management : objectives, policies & procedures / delivered by Blake Shorthouse W'PONDS  Book 1984?
005.8 Sho/Tmd    
      Threat modeling : designing for security / Adam Shostack GIFT CITY  Book 2014
      Threat modeling : designing for security / Adam Shostack GIFT CITY  Book 2014
005.8 Shy/Imd : Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds)     
      Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds) MELB  Book 2007
005.8 Sim/Hoe 2011    
      Hands on ethical hacking and network defense / by Michael T. Simpson MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson MELB, W'PONDS   Book 2011
2 additional entries    
005.8 Sim/Hoe 2017 : Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas D. Antill.     
      Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas D. Antill. MELB  Book 2017
005.8 Skl/Hkt : Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov     
      Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov W'PONDS  Book 2004
005.8 Skl/Wsa    
      Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang MELB, W'PONDS   Book 2007
      Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang MELB, W'PONDS   Book 2007
005.8 Sko/Cha    
      Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis MELB, W'PONDS   Book 2002
      Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis MELB, W'PONDS   Book 2002
005.8 Sko/Mfm : Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser     
      Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser W'PONDS  Book 2004
005.8 Sla/Its    
      Information technology security and risk management / Jill Slay, Andy Koronios MELB, W'BOOL, W'PONDS   Book 2006
      Information technology security and risk management / Jill Slay, Andy Koronios MELB, W'BOOL, W'PONDS   Book 2006
      Information technology security and risk management / Jill Slay, Andy Koronios MELB, W'BOOL, W'PONDS   Book 2006
005.8 Sla/Rsg 1996 : Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help     
      Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help W'PONDS  Book 1996
005.8 Smi/Cos    
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
2 additional entries    
005.8 Smi/Tcc : Trusted computing platforms : design and applications / Sean W. Smith     
      Trusted computing platforms : design and applications / Sean W. Smith W'PONDS  Book 2005
005.8 Spa/Cma    
      Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us / Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra ; illustrations by Pattie Spafford GIFT CITY  Book 2023
      Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us / Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra ; illustrations by Pattie Spafford GIFT CITY  Book 2023
005.8 Sql And/Sss    
      SQL server security / Chip Andrews, David Litchfield, Bill Grindlay MELB, W'PONDS   Book 2003
      SQL server security / Chip Andrews, David Litchfield, Bill Grindlay MELB, W'PONDS   Book 2003
005.8 Sql Lew/Sss : SQL server security distilled / Morris Lewis     
      SQL server security distilled / Morris Lewis W'PONDS  Book 2004
005.8 Sta/Can 1999 : Cryptography and network security : principles and practice / William Stallings     
      Cryptography and network security : principles and practice / William Stallings W'PONDS  Book 1999
005.8 Sta/Can 2003 : Cryptography and network security : principles and practice / William Stallings     
      Cryptography and network security : principles and practice / William Stallings MELB  Book 2003
005.8 Sta/Can 2006    
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2006
005.8 Sta/Csp 2018    
      Computer security : principles and practice / William Stallings, Lawrie Brown GIFT CITY  Book 2018
      Computer security : principles and practice / William Stallings, Lawrie Brown GIFT CITY  Book 2018
005.8 Sta/Hoi    
      Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors MELB, W'PONDS   Book 2010
      Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors MELB, W'PONDS   Book 2010
005.8 Sta/Hpl : Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane     
      Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane W'PONDS  Book 2001
005.8 Sta/Isp : Information security : principles and practice / Mark Stamp     
      Information security : principles and practice / Mark Stamp MELB  Book 2006
005.8 Sta/Nai : Network and internetwork security : principles and practice / William Stallings     
      Network and internetwork security : principles and practice / William Stallings W'PONDS  Book 1995
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next