This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-15 of 15)
Computer security -- Case studies
1
2021
Big breaches : cybersecurity lessons for everyone
Daswani, Neil, author.
[Berkeley] : Apress, [2021]
Rating:
Electronic Resources
More...
2
2018
Big data technologies for monitoring of computer security : a case study of the Russian Federation
Petrenko, Sergei
Rating:
Electronic Resources
More...
3
2015
Case studies in secure computing : achievements and trends
Boca Raton : Taylor & Francis, CRC Press, [2015]
Rating:
Electronic Resources
4
2014
Case studies in secure computing : achievements and trends
1st
Boca Raton : Auerbach, 2014
Rating:
Electronic Resources
5
2023
Cybersecurity First Principles
Howard, Rick
Rating:
Electronic Resources
6
2023
Cybersecurity first principles : a reboot of strategy and tactics
Howard, Richard, 1959- author
Hoboken, New Jersey : John Wiley & Sons, [2023]
Rating:
7
2009
Global initiatives to secure cyberspace : an emerging landscape
New York : Springer, [2009]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 Por/Git
AVAILABLE
8
2020
Human dimensions of cybersecurity
Bossomaier, Terry R. J. (Terry Richard John), author.
Boca Raton : CRC Press, [2020]
Rating:
Electronic Resources
9
2006
Information security : contemporary cases
Wright, Marie A.
Boston : Jones and Bartlett, [2006]
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Wri/Isc
AVAILABLE
MELB
005.8 Wri/Isc
AVAILABLE
10
2010
Internet fraud casebook : the World Wide Web of deceit
Rating:
Electronic Resources
More...
11
1997
Managing information system security
Dhillon, Gurpreet, 1963-
Basingstoke : Macmillan, 1997
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Dhi/Mis
AVAILABLE
12
2003
The new forensics : investigating corporate fraud and the theft of intellectual property
Anastasi, Joe, 1953-
Hoboken, N.J. : John Wiley & Sons, [2003]
Rating:
Request It
Location
Call no.
Vol.
Availability
W'BOOL
363.25968 Ana/Nfi
AVAILABLE
13
2016
The nuclear effect of computer malware : impact of politics on computer-controlled operational processes
Tipi, Lucian, author.
Rating:
Electronic Resources
14
2011
Readings and cases in information security : law and ethics
Whitman, Michael E., 1964-
Boston, MA : Course Technology, Cengage Learning, [2011]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
174.93843 Whi/Rac
AVAILABLE
WATERFT BUSINESS
174.93843 Whi/Rac
AVAILABLE
15
2016
Real world effects of cyber-attacks : security issues in computer-controlled production
Tipi, Lucian, author.
[Place of publication not identified] : Kogan Page, [2016]
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search