Limit search to available items
19 results found. Sorted by relevance | date | title .
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-19 of 19)
Very relevant 

Very relevant titles

 entries 1-10
1
Book
2008

The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlsta


IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society (3rd : 2007 : Karlstad, Sweden)

New York : Springer, [2008]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Ifi/Pwg 2007  AVAILABLE
 W'PONDS  005.8 Ifi/Pwg 2007  AVAILABLE
2
Book
2005

Cryptography, information theory, and error-correction : a handbook for the 21st century


Bruen, Aiden A., 1941-

Hoboken, N.J. : Wiley-Interscience, [2005]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Bru/Cit  AVAILABLE
3
Book
2004

Know your enemy : learning about security threats



Second edition
Boston : Addison-Wesley, 2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Hon/Kye 2004  AVAILABLE
4
Book
2003

Practical cryptography


Ferguson, Niels.

Indianapolis, Ind. : Wiley, [2003]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.82 Fer/Pcr  AVAILABLE
5
Book
2003

Computers, ethics, and society



Third edition
New York : Oxford University Press, 2003

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  303.4834 Erm/Cea 2003  AVAILABLE
6
Book
2002

Introduction to cryptography : principles and applications


Delfs, Hans.

Berlin ; New York : Springer, 2002

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.82 Del/Itc  AVAILABLE
7
Book
2001

B2b and beyond : new business models built on trust


DeMaio, Harry B.

New York ; Chichester : Wiley, [2001]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.0558 Dem/Bab  AVAILABLE
8
Book
1999

Modern cryptography, probabilistic proofs, and pseudorandomness


Goldreich, Oded.

Berlin ; New York : Springer, [1999]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Gol/Mcp  AVAILABLE
9
Book
1999

Elliptic curves in cryptography


Blake, Ian F.

Cambridge : Cambridge University Press, 1999

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.82 Bla/Eci  AVAILABLE
10
Book
1989

Safe and secure computing systems




Oxford ; Boston : Blackwell Scientific Publications, 1989

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 And/Sas  AVAILABLE
Other relevant 

Other relevant titles

 entries 11-19
12
E-book
2022

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework


Brumfield, Cynthia, author.

Hoboken, NJ : John Wiley & Sons, Inc., 2022

Rating:

 
13
E-book
2022

Stream ciphers in modern real-time IT systems : analysis, design and comparative studies


Kuznetsov, Alexandr Alexandrovich, author

Cham, Switzerland : Springer, [2022]

Rating:

 
14
E-book
2021

Information risk management : a practitioner's guide


Sutton, David, author.
2nd ed
England : BCS Learning & Development Limited, [2021]

Rating:

 
16
E-book
2014

Information Risk Management : a Practitioner's Guide


Sutton, David (Information security practitioner), author.

London : BCS, 2014

Rating:

 
17
E-book
2014

The InfoSec handbook : an introduction to information security


Rao, Umesh Hodeghatta, author

Berkeley, CA : ApressOpen, 2014

Rating:

 
18
Book
2011

Roadmap to information security : for IT and InfoSec managers


Whitman, Michael E., 1964-

Boston, Mass : Course Technology/Cengage Learning, [2011]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Whi/Rti  AVAILABLE
 MELB  005.8 Whi/Rti  AVAILABLE
 MELB  005.8 Whi/Rti  AVAILABLE
19
E-book
2006

Securing SCADA systems


Krutz, Ronald L., 1938-



Rating:

 
Add Marked to Bag Add All On Page Add Marked to My Lists