Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
005.8 Bez/Pai : Privacy and identity management for life 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.7/PrimeLife international summer school, Nice, France, September 7 - 11, 2009 ; revised selected papers / Michele Bezzi ... (ed.)  2010 1
005.8 Bid/Hoi   2
005.8 Big/Bhm : Black hats : misfits, criminals, and scammers in the Internet age / John Biggs  2004 1
005.8 Bir/Soh : Special ops : host and network security for Microsoft, UNIX, and Oracle / Erik Pace Birkholz ; special forward by Stuart McClure  2003 1
005.8 Bis/Ite : Introduction to computer security / Matt Bishop  2005 1
005.8 Bis/Sic : Security in computing systems : challenges, approaches and solutions / Joachim Biskup  2009 1
005.8 Ble/Tin   4
005.8 Bly/Ias : Information assurance : surviving in the information environment / Andrew Blyth and Gerald C. Kovacich  2001 1
005.8 Bly/Ias 2006 : Information assurance : security in the information environment / Andrew Blyth and Gerald L. Kovacich  2006 1
005.8 Boc/Dso : The dark side of the Internet : protecting yourself and your family from online criminals / Paul Bocij  2006 1
005.8 Boc/Nse : .NET security / Jason Bock ... [and others]  2002 1
005.8 Boy/Cop : Code of practice for cyber security in the built environment / [author, Hugh Boyes]  2014 1
005.8 Boy/Isa 2005 : Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. Gonz├ílez Nieto (eds.)  2005 1
005.8 Bro/Ndg : The .NET developer's guide to Windows security / Keith Brown  2004 1
005.8 Bru/Cit : Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito  2005 1
005.8 Bru/Sid : Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey  1997 1
005.8 Bur/Cds : Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies  1989 1
005.8 Cac/Hew 2010 : Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu  2010 1
005.8 Cae/Ish : Information security handbook / [edited by] William Caelli, Dennis Longley, Michael Shain  1991 1
005.8 Cae/Ish 1994 : Information security handbook / William Caelli, Dennis Longley, Michael Shain  1994 1
005.8 Cal/Bgt : A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder  2005 1
005.8 Cal/Cfa : Computer forensics and privacy / Michael A. Caloyannides  2001 1
005.8 Cal/Iig : International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins  2006 1
005.8 Cal/Isi : Information security intelligence : cryptographic principles and applications / Thomas Calabrese  2004 1
005.8 Cal/Ppa 2004   3
005.8 Cal/Tro : Ten rules of information security for the smaller business : a plain English guide / Alan Calder  2008 1
005.8 Cam/Fci : Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (eds.)  2011 1
005.8 Can/Pri : Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian]  2005 1
005.8 Car/Dca : Data communications and network security / Houston H. Carr, Charles A. Snyder  2007 1
005.8 Car/Mon   3
005.8 Car/Sci : Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council  1991 1
005.8 Car/Wfa : Windows forensics and incident recovery / Harlan Carvey  2005 1
005.8 Cas/Dse : Sicurezza del basi di dati. English  1995 1
005.8 Cer/Cys   2
005.8 Cha/Bif : Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky  1995 1
005.8 Cha/Bif 2000   2
005.8 Cha/Pki : Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)  2005 1
005.8 Che/Ias : Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen  2006 1
005.8 Che/Nse : National security / edited by H. Chen ... [and others]  2007 1
005.8 Che/Sod   2
005.8 Che/Stp   2
005.8 Chi/Had : Hack attacks denied : a complete guide to network lockdown / John Chirillo  2001 1
005.8 Chi/Har : Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo  2001 1
005.8 Cho/Cah : Cybersecurity and homeland security / Lin V. Choi editor  2005 1
005.8 Cho/Pws : Protecting web services from distributed denial of service attacks / by Ashley Chonka  2009 1
005.8 Cho/Rod   3
005.8 Chr/Spf 1997 : Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)  1998 1
005.8 Cis/Sgt   2
005.8 Cis/Sgt 2009   3
005.8 Cla/Est : Enterprise security : the manager's defense guide / David Leon Clark  2003 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next