Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Str/Htf : Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker     
      Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker WATERFT  Book 2012
005.8 Str/Isp : Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors     
      Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors MELB  Book 2008
005.8 Sub/Csp : Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor]     
      Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor] MELB  Book 2008
005.8 Swi/Tmo    
      Threat modeling / Frank Swiderski and Window Snyder MELB, W'PONDS   Book 2004
      Threat modeling / Frank Swiderski and Window Snyder MELB, W'PONDS   Book 2004
005.8 Sym/Pot 2001 : Proceedings of the...Symposium on Security and Privacy     
      Proceedings of the...Symposium on Security and Privacy MELB  Book  
005.8 Szo/Aoc    
      The art of computer virus research and defense / Peter Szor MELB, W'PONDS   Book 2005
      The art of computer virus research and defense / Peter Szor MELB, W'PONDS   Book 2005
005.8 Tat/Ffa : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate     
      A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate MELB THESES  Book 2009
005.8 Tce/Iis 2004 : Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by Yves Deswarte ... [and others]     
      Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by W'PONDS  Book 2004
005.8 Tho/Nsf    
      Network security first-step / Tom Thomas MELB, W'PONDS   Book 2004
      Network security first-step / Tom Thomas MELB, W'PONDS   Book 2004
005.8 Thu/Daa : Database and applications security : integrating information security and data management / Bhavani Thuraisingham     
      Database and applications security : integrating information security and data management / Bhavani Thuraisingham W'PONDS  Book 2005
005.8 Tib/Fav    
      Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes MELB, W'PONDS   Book 2006
      Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes MELB, W'PONDS   Book 2006
005.8 Til/Foc : Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg     
      Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg MELB  Book 2000
005.8 Trc/Mis : Managing information systems security and privacy / Denis Trcek     
      Managing information systems security and privacy / Denis Trcek MELB  Book 2006
005.8 Tre/Pon : Privacy online / edited by Sabine Trepte, Leonard Reinecke     
      Privacy online / edited by Sabine Trepte, Leonard Reinecke W'PONDS  Book 2011
005.8 Tso/Drm : Digital rights management for e-commerce systems / Dimitrios Tsolis ... [and others]     
      Digital rights management for e-commerce systems / Dimitrios Tsolis ... [and others] MELB  Book 2009
005.8 Unix Bar/Sts : SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman     
      SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman MELB  Book 2001
005.8 Unix Cur/Uss : UNIX system security : a guide for users and system administrators / David A. Curry     
      UNIX system security : a guide for users and system administrators / David A. Curry W'PONDS  Book 1992
005.8 Unix Gar/Pua 2003 : Practical UNIX and Internet security     
      Practical UNIX and Internet security W'PONDS  Book 2003
005.8 Unix Gar/Pus : Practical UNIX security / Simson Garfinkel and Gene Spafford     
      Practical UNIX security / Simson Garfinkel and Gene Spafford W'PONDS  Book 1991
005.8 Unix Ros/Uss : UNIX system security tools / Seth T. Ross     
      UNIX system security tools / Seth T. Ross W'PONDS  Book 2000
005.8 Vac/Cfc 2005 : Computer forensics : computer crime scene investigation / John R. Vacca     
      Computer forensics : computer crime scene investigation / John R. Vacca MELB  Book 2005
005.8 Vac/Gtw : Guide to wireless network security / by John R. Vacca     
      Guide to wireless network security / by John R. Vacca W'PONDS  Book 2006
005.8 Vac/Mis : Managing information security / editor, John R. Vacca     
      Managing information security / editor, John R. Vacca MELB  Book 2010
005.8 Vac/Nas : Network and system security / editor, John R. Vacca     
      Network and system security / editor, John R. Vacca MELB  Book 2010
005.8 Vac/Pis    
      Practical Internet security / by John R. Vacca MELB, W'PONDS   Book 2007
      Practical Internet security / by John R. Vacca MELB, W'PONDS   Book 2007
005.8 Vau/Cit    
      A classical introduction to cryptography : applications for communications security / by Serge Vaudenay MELB, W'PONDS   Book 2006
      A classical introduction to cryptography : applications for communications security / by Serge Vaudenay MELB, W'PONDS   Book 2006
005.8 Vie/Bss : Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw     
      Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw W'PONDS  Book 2002
005.8 Vie/Mos : The myths of security : what the computer security industry doesn't want you to know / John Viega     
      The myths of security : what the computer security industry doesn't want you to know / John Viega W'PONDS  Book 2009
005.8 Vig/Maa : Mobile agents and security / Giovanni Vigna, ed     
      Mobile agents and security / Giovanni Vigna, ed W'PONDS  Book 1998
005.8 Vin/Wse : Wireless security essentials : defending mobile systems from data piracy / Russell Dean Vines     
      Wireless security essentials : defending mobile systems from data piracy / Russell Dean Vines W'BOOL  Book 2002
005.8 Vla/Wfo : Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky     
      Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky W'PONDS  Book 2004
005.8 Vol/Pap    
      Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino MELB, W'PONDS   Book 2004
      Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino MELB, W'PONDS   Book 2004
005.8 Wag/Con : Cryptanalysis of number theoretic ciphers / Samuel S. Wagstaff, Jr     
      Cryptanalysis of number theoretic ciphers / Samuel S. Wagstaff, Jr MELB  Book 2003
005.8 Wal/Epa    
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors MELB, WATERFT   Book 2007
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors MELB, WATERFT   Book 2007
005.8 Wan/Cns : Computer network security : theory and practice / Jie Wang     
      Computer network security : theory and practice / Jie Wang MELB  Book 2009
005.8 Wan/Cop : Component-oriented programming / Andy Ju An Wang & Kai Qian     
      Component-oriented programming / Andy Ju An Wang & Kai Qian W'PONDS  Book 2005
005.8 Wan/Isr    
      Information security research : new methods for protecting against cyber threats / Department of Defense ; editors, Cliff Wang ... [and others] MELB, W'PONDS   Book 2007
      Information security research : new methods for protecting against cyber threats / Department of Defense ; editors, Cliff Wang ... [and others] MELB, W'PONDS   Book 2007
005.8 Wan/Stc    
      Steal this computer book 4.0 : what they won't tell you about the Internet / Wallace Wang MELB, W'PONDS   Book 2006
      Steal this computer book 4.0 : what they won't tell you about the Internet / Wallace Wang MELB, W'PONDS   Book 2006
005.8 War/Eha    
      A European healthcare approach to computer security risk analysis / M.J. Warren MELB, WATERFT ADPML   Book 1999
      A European healthcare approach to computer security risk analysis / M.J. Warren MELB, WATERFT ADPML   Book 1999
005.8 War/Eis : Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford Vaughn     
      Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford Vaughn W'PONDS  Book 2006
005.8 War/Pss : A practical soft system management approach to implementing security / M. Warren     
      A practical soft system management approach to implementing security / M. Warren WATERFT ADPML  Book 1999
005.8 War/Wcb : What can BS7799 teach Australia and New Zealand? / Matthew Warren     
      What can BS7799 teach Australia and New Zealand? / Matthew Warren WATERFT ADPML  Book 1998
005.8 Way/Dcp : Digital copyright protection / Peter Wayner     
      Digital copyright protection / Peter Wayner W'PONDS  Book 1997
005.8 Wea/Gtn 2007 : Guide to network defense and countermeasures / by Randy Weaver     
      Guide to network defense and countermeasures / by Randy Weaver MELB  Book 2007
005.8 Wei/Cig : The complete idiot's guide to protecting yourself on the Internet / by Aaron Weiss     
      The complete idiot's guide to protecting yourself on the Internet / by Aaron Weiss W'PONDS  Book 1995
005.8 Wei/Sie : Security in e-learning / by Edgar R. Weippl     
      Security in e-learning / by Edgar R. Weippl W'PONDS  Book 2005
005.8 Whi/ Poi 2009 : Principles of information security / Michael E. Whitman, Herbert J. Mattord     
      Principles of information security / Michael E. Whitman, Herbert J. Mattord W'BOOL, W'PONDS   Book 2009
005.8 Whi/Csa : Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch     
      Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch W'PONDS  Book 1996
005.8 Whi/Gtf 2012    
      Guide to firewalls AND VPNs / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2012
      Guide to firewalls AND VPNs / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2012
005.8 Whi/Gtn    
      Guide to network security / Michael Whitman ... [et.al.] MELB, W'PONDS   Book c2013
      Guide to network security / Michael Whitman ... [et.al.] MELB, W'PONDS   Book c2013
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next