Limit search to available items
Result Page   
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-50 of 51)
Electronic data processing departments -- Security measures.
4
E-book
2016

The CISO Handbook


Gentile, Michael, author
1st edition
Auerbach Publications, 2016

Rating:

 
5
Book
1989

The complete computer virus handbook


Frost, David, 1946-
[Second edition]
London : Pitman, 1989

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Fro/Ccv  AVAILABLE
6
Book
1995

Computer crime : a crimefighter's handbook


Icove, David J., 1949-
First edition
Sebastopol, CA : O'Reilly & Associates, 1995

Rating:

Request It 
 
Location Call no. Vol. Availability
 WATERFT LAW  KM 565 C5 G1 Ico/Cca  AVAILABLE
 MELB  KM 565 C5 G1 Ico/Cca  AVAILABLE
 W'BOOL  364.162 Ico/Cca  AVAILABLE
7
Book
1979

Computer fraud and countermeasures


Krauss, Leonard I.

Englewood Cliffs : Prentice-Hall, [1979]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.163 Kra  AVAILABLE
8
Book
1990

Computer security


Roberts, D. W. (David W.)

London : Blenheim Online Publications, 1990

Rating:

Request It 
 
Location Call no. Vol. Availability
 WATERFT BUSINESS  658.478 Rob/Cse  AVAILABLE
9
Book
1996

Computer security


Carroll, John Millar
Third edition
Boston, Mass. : Butterworth-Heinemann, 1996

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.47 Car/Cse 1996  AVAILABLE
10
Book
1984

Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984


IFIP International Conference on Computer Security (2nd : 1984 : Toronto, Ont.)

Amsterdam ; New York : North-Holland ; New York, N.Y. : Sole distributors for the U.S.A. and Canada, Elsevier Science Pub. Co., 1984

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Ifi  AVAILABLE
11
Book
2004

Computer security for the home and small office


Greene, Thomas C.

New York : Apress, [2004]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  658.478 Gre/Csf  AVAILABLE
12
E-book
2014

Computer security handbook



Sixth edition
Hoboken, New Jersey : Wiley, [2014]

Rating:

 
13
E-book
2009

Computer security handbook



5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne


Rating:

 
14
Book
2014

Computer security handbook



Sixth edition
Hoboken, New Jersey : John Wiley & Sons, Inc., [2014]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.478 Bos/Csh 2014  1  AVAILABLE
 MELB  658.478 Bos/Csh 2014  2  AVAILABLE
15
Book
1984

Computer-security technology


Cooper, James Arlin.

Lexington, Mass. : Lexington Books, [1984]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Coo  AVAILABLE
16
Book
1995

Computer software protection


Australia. Copyright Law Review Committee.

Barton, A.C.T. : Office of Legal Information and Publishing, Attorney-General's Dept., [1995]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  KN 112.7 K1 Aus/Csp  AVAILABLE
17
Book
c2004

Corporate computer and network security


Panko, Raymond R.

Upper Saddle River, NJ : Pearson Prentice Hall, c2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Pan/Cca  AVAILABLE
 W'PONDS  005.8 Pan/Cca  AVAILABLE
 MELB  005.8 Pan/Cca  AVAILABLE
18
Book
2010

Corporate computer and network security


Panko, Raymond R.
Second edition
Boston ; Upper Saddle River, NJ : Pearson Education, [2010]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Pan/Cca 2010  AVAILABLE
 W'PONDS  005.8 Pan/Cca 2010  AVAILABLE
 MELB  005.8 Pan/Cca 2010  AVAILABLE
19
Location Call no. Vol. Availability
 W'PONDS  001.5436 Mey  AVAILABLE
21
Streaming video
2018

Cyber threat prevention


Thurlbeck, Stephen, (Paralucent Inc., Canada)



Rating:

 
22
E-book
2013

Cyber world, site under construction


Institute for Security Studies (Paris, France)



Rating:

 
23
E-book
2015

Data center handbook




Hoboken, New Jersey : John Wiley & Sons Inc., [2015]

Rating:

 
24
E-book
2014

Data Center Handbook


Geng, Hwaiyu



Rating:

 
25
E-book
2021

Data governance and compliance : evolving to our current high stakes environment


Mahanti, Rupa, author.

Singapore : Springer, [2021]

Rating:

 
27
Book
1987

Datatheft : computer fraud, industrial espionage, and information crime


Cornwall, Hugo.

London : Heinemann, 1987

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  364.163 C821D  AVAILABLE
28
Book
1989

The Gothic idol : ideology and image-making in medieval art


Camille, Michael.

Cambridge ; New York : Cambridge University Press, 1989

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  246.0902 Cam/Gii  AVAILABLE
29
Microform
1999

Guidelines for automatic data processing physical security and risk management


Reed, Susan.

Springfield, Va. : National Technical Information Service, [between 1900-1999]

Rating:

 
 
Location Call no. Vol. Availability
 W'PONDS FICHE  658.478 Ree  AVAILABLE
30
Streaming video
2018

Information risk management


Popa, Claudiu, (Informatica Corporation, Canada)



Rating:

 
31
Book
1989

Information security


Bright, Des

North Ryde, NSW : Science Research Associates Pty Ltd, 1989

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.47 Bri/Ise  AVAILABLE
32
33
Book
1991

Introduction to data security and controls


Buck, Edward R.
Second edition
Boston, Mass. : Q.E.D. Technical Pub. Group, [1991]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 B922I2  AVAILABLE
34
Streaming video
2018

Introduction to practical cybersecurity


Popa, Claudiu, (Informatica Corporation, Canada)



Rating:

 
35
 
Location Call no. Vol. Availability
 MELB  658.478 Cpa/Itg  AVAILABLE
36
E-book
2014

Managing information security



2nd edition
Waltham, MA : Syngress, 2014

Rating:

 
39
Book
2002

Network security : PRIVATE communication in a PUBLIC world


Kaufman, Charlie.
Second edition
Upper Saddle River, NJ ; [Great Britain] : Prentice Hall PTR, [2002]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Kau/Nsp 2002  AVAILABLE
 W'PONDS  005.8 Kau/Nsp 2002  AVAILABLE
40
E-book
2002

Network security : private communication in a public world


Kaufman, Charlie, author.
Second edition
Upper Saddle River, N.J. : Prentice Hall PTR, 2002

Rating:

 
41
E-book
2005

Physical security for IT


Erbschloe, Michael, 1951-



Rating:

 
42
Book
1990

The prevention and detection of computer fraud


Collier, P. A. (Paul A.)

London : CIMA, 1990

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.163 Col/Pad  AVAILABLE
43
Book
1972

Privacy and computers : a report of a task force established jointly by the Department of Communications / Department of Justice


Canada. Department of Communications.

[Ottawa] : Department of Communications : Department of Justice, [1972]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  323.44 PRI  AVAILABLE
44
E-book
2014

Responsive security : be ready to be secure


Kang, Meng-Chow.

Boca Raton [Florida] : CRC Press/Taylor & Francis, [2014]

Rating:

 
45
Book
1989

Safe and secure computing systems




Oxford ; Boston : Blackwell Scientific Publications, 1989

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 And/Sas  AVAILABLE
47
Streaming video
2019

Security analysis


Popa, Claudiu, (Informatica Corporation, Canada)



Rating:

 
49
Book
1991

Security in computer operating systems


O'Shea, G

Manchester, England : NCC Blackwell, 1991

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Osh/Sic  AVAILABLE
50
Book
2002

Security planning & disaster recovery


Maiwald, Eric.

Berkeley, Calif. ; London : Osborne/McGraw-Hill, 2002

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Mai/Spa  AVAILABLE
Add Marked to Bag Add All On Page
Locate in results
Result Page