Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.7585 Oracle Mor/Osi : Oracle SQL interactive workbook / Alex Morrison & Alice Rischert     
      Oracle SQL interactive workbook / Alex Morrison & Alice Rischert BONUS, W'PONDS   Book 2000
005.7585 Oracle Mot/Ofi : Oracle Forms interactive workbook / Baman Motivala     
      Oracle Forms interactive workbook / Baman Motivala BONUS, W'PONDS   Book 2000
005.7585 Oracle Pow/Ohp    
      Oracle high performance tuning for 9i and 10g / Gavin Powell BONUS, MELB, W'PONDS   Book 2004
      Oracle high performance tuning for 9i and 10g / Gavin Powell BONUS, MELB, W'PONDS   Book 2004
005.7585 Oracle Pri/Lop : Learning Oracle PL/SQL / Bill Pribyl with Steven Feuerstein     
      Learning Oracle PL/SQL / Bill Pribyl with Steven Feuerstein BONUS, MELB   Book 2002
005.7585 Oracle Ris/Osb 2004 : Oracle SQL by example / Alice Rischert     
      Oracle SQL by example / Alice Rischert BONUS, W'BOOL   Book 2004
005.7585 Oracle Rod/Oad 1999 : Oracle : a database developer's guide / Ulka Rodgers     
      Oracle : a database developer's guide / Ulka Rodgers BONUS, W'PONDS   Book 1999
005.7585 Oracle Sar/Odb : Oracle DBA tips and techniques / Sumit Sarin     
      Oracle DBA tips and techniques / Sumit Sarin BONUS, W'PONDS   Book 2000
005.7585 Oracle Say/Htu : How to use ORACLE SQL*PLUS / Jonathan S. Sayles     
      How to use ORACLE SQL*PLUS / Jonathan S. Sayles BONUS, W'PONDS   Book 1990
005.7585 Oracle Sta/Got : Guerrilla Oracle : the succinct Windows perspective / Richard J. Staron     
      Guerrilla Oracle : the succinct Windows perspective / Richard J. Staron BONUS, MELB   Book 2002
005.7585 Oracle Sto/Odt 1999 : Oracle developer/2000 handbook / Michael Stowe     
      Oracle developer/2000 handbook / Michael Stowe BONUS, W'PONDS   Book 1999
005.7585 Oracle Sun/Opa : Oracle9i programming : a primer / Rajshekhar Sunderraman     
      Oracle9i programming : a primer / Rajshekhar Sunderraman BONUS, W'PONDS   Book 2003
005.7585 Oracle Tho/Oxc : Oracle XSQL : combining SQL, Oracle text, XSLT, and Java to publish dynamic Web content / Michael D. Thomas     
      Oracle XSQL : combining SQL, Oracle text, XSLT, and Java to publish dynamic Web content / Michael D. Thomas BONUS, MELB   Book 2003
005.7585 Oracle Tol/Onc : Oracle net 8 configuration and troubleshooting / Hugo Toledo     
      Oracle net 8 configuration and troubleshooting / Hugo Toledo BONUS, W'PONDS   Book 2001
005.7585 Oracle Urm/Opp : Oracle8 PL/SQL programming / Scott Urman     
      Oracle8 PL/SQL programming / Scott Urman BONUS, W'PONDS   Book 1997
005.7585 Oracle Van/Oas : Oracle9i Application Server Portal handbook / Steve Vandivier, Kelly Cox     
      Oracle9i Application Server Portal handbook / Steve Vandivier, Kelly Cox BONUS, W'PONDS   Book 2002
005.7585 Sybase Ber/Sac : Sybase and client/server computing / Alex Berson, George Anderson     
      Sybase and client/server computing / Alex Berson, George Anderson BONUS, W'PONDS   Book 1995
005.8 Aat/Iis 2010 : Workshop proceedings of ATIS 2010 : Melbourne, November 10th, 2010. First Applications and Techniques in Information Security Workshop / edited by Matthew Warren     
      Workshop proceedings of ATIS 2010 : Melbourne, November 10th, 2010. First Applications and Techniques in Information Security Workshop / edited by Matthew Warren BONUS, MELB   Book 2010
005.8 Aat/Iis 2015 : Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings / Wenjia Niu [and six others], (eds.)     
      Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings / Wenjia Niu [and six others], (eds.) BONUS, MELB   Book 2015
005.8 Abr/Isa : Information security : an integrated collection of essays / edited by Marshall D. Abrams, Sushil Jajodia, Harold J. Podell     
      Information security : an integrated collection of essays / edited by Marshall D. Abrams, Sushil Jajodia, Harold J. Podell BONUS, W'PONDS   Book 1995
005.8 Access Rob/Rwm : Real world Microsoft Access database protection and security / Garry Robinson     
      Real world Microsoft Access database protection and security / Garry Robinson BONUS, W'PONDS   Book 2004
005.8 Aci/Isa 1998 : Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / Colin Boyd, Ed Dawson, (eds.)     
      Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / Colin Boyd, Ed Dawson, (eds.) BONUS, W'PONDS   Book 1998
005.8 Aci/Isa 1999 : Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.)     
      Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.) BONUS, W'PONDS   Book 1999
005.8 Aci/Isa 2002    
      Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings / Lynn Batten, Jennifer Seberry (eds.) BONUS, W'PONDS, WATERFT ADPML   Book 2002
      Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings / Lynn Batten, Jennifer Seberry (eds.) BONUS, W'PONDS, WATERFT ADPML   Book 2002
005.8 Acm/Cac 1998 : [Proceedings] / 5th ACM Conference on Computer and Communications Security, November 3-5, 1998 San Francisco, California ; sponsored by: ACM SIGSAC     
      [Proceedings] / 5th ACM Conference on Computer and Communications Security, November 3-5, 1998 San Francisco, California ; sponsored by: ACM SIGSAC BONUS, W'PONDS   Book 1998
005.8 Acm/Cac 1999 : 6th ACM Conference on Computer and Communications Security, November 2-4, 1999, Kent Ridge Digital Labs, Singapore     
      6th ACM Conference on Computer and Communications Security, November 2-4, 1999, Kent Ridge Digital Labs, Singapore BONUS, W'PONDS   Book 1999
005.8 Acq/Dpt : Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti ... [and others]     
      Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti ... [and others] BONUS, MELB   Book 2008
005.8 Acroba Ado/Aao : Adobe Acrobat official JavaScript reference / [Adobe Systems Inc.]     
      Adobe Acrobat official JavaScript reference / [Adobe Systems Inc.] BONUS, W'PONDS   Book 2006
005.8 Afy/Dsa    
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni BONUS, MELB, W'PONDS   Book 2006
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni BONUS, MELB, W'PONDS   Book 2006
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni BONUS, MELB, W'PONDS   Book 2006
005.8 Ale/Nsy : Net security : your digital doberman : sure-fire strategies for wired businesses / Michael Alexander     
      Net security : your digital doberman : sure-fire strategies for wired businesses / Michael Alexander BONUS, W'PONDS   Book 1997
005.8 Alj/Ena    
      Electronic negotiation and security of exchanged information in e-commerce / by Raja Al-Jaljouli and Jemal Abawajy BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      Electronic negotiation and security of exchanged information in e-commerce / by Raja Al-Jaljouli and Jemal Abawajy BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      Electronic negotiation and security of exchanged information in e-commerce / by Raja Al-Jaljouli and Jemal Abawajy BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
005.8 All/Cgt : The CERT guide to system and network security practices / Julia H. Allen     
      The CERT guide to system and network security practices / Julia H. Allen BONUS, MELB   Book 2001
005.8 Alp/Nsa : Network security : a decision and game-theoretic approach / Tansu Alpcan and Tamer Başar     
      Network security : a decision and game-theoretic approach / Tansu Alpcan and Tamer Başar BONUS, MELB   Book 2011
005.8 Amo/Foc : Fundamentals of computer security technology / Edward G. Amoroso     
      Fundamentals of computer security technology / Edward G. Amoroso BONUS, W'PONDS   Book 1994
005.8 And/Sas : Safe and secure computing systems / editor, T. Anderson     
      Safe and secure computing systems / editor, T. Anderson BONUS, W'PONDS   Book 1989
005.8 And/Sea : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson     
      Security engineering : a guide to building dependable distributed systems / Ross J. Anderson BONUS, MELB   Book 2001
005.8 And/Sea 2008    
      Security engineering : a guide to building dependable distributed systems / Ross J Anderson BONUS, MELB, W'PONDS   Book 2008
      Security engineering : a guide to building dependable distributed systems / Ross J Anderson BONUS, MELB, W'PONDS   Book 2008
005.8 Anj/Sfw : Security for wireless ad-hoc networks / by Farooq Anjum and Petros Mouchtaris     
      Security for wireless ad-hoc networks / by Farooq Anjum and Petros Mouchtaris BONUS, WATERFT   Book 2007
005.8 Aso/Qdp    
      Querying databases privately : a new approach to private information retrieval / Dmitri Asonov BONUS, MELB   Book 2004
      Querying databases privately : a new approach to private information retrieval / Dmitri Asonov BONUS, MELB   Book 2004
005.8 Avo/Css : Computer system security : basic concepts and solved exercises / Gildas Avoine, Pascal Junod and Philippe Oechslin     
      Computer system security : basic concepts and solved exercises / Gildas Avoine, Pascal Junod and Philippe Oechslin BONUS, MELB   Book 2007
005.8 Axe/Uid : Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands     
      Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands BONUS, W'PONDS   Book 2006
005.8 Ayc/Saa    
      Spyware and adware / John Aycock BONUS, MELB, W'PONDS   Book 2011
      Spyware and adware / John Aycock BONUS, MELB, W'PONDS   Book 2011
005.8 Aza/Csm    
      Current security management & ethical issues of information technology / edited by Rasool Azari BONUS, W'BOOL, W'PONDS   Book 2003
      Current security management & ethical issues of information technology / edited by Rasool Azari BONUS, W'BOOL, W'PONDS   Book 2003
005.8 B922I2 : Introduction to data security and controls / Edward R. Buck, III     
      Introduction to data security and controls / Edward R. Buck, III BONUS, MELB   Book 1991
005.8 Bac/Ide : Intrusion detection     
      Intrusion detection BONUS, W'PONDS   Book 1999
005.8 Bal/Eha    
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
005.8 Bas/Ccs : CCSP SNRS exam certification guide / Greg Bastien, Sarah Nasseh, Christian Abera Degu     
      CCSP SNRS exam certification guide / Greg Bastien, Sarah Nasseh, Christian Abera Degu BONUS, W'PONDS   Book 2005
005.8 Bas/Csa    
      Computer security and penetration testing / Alfred Basta and Wolf Halton BONUS, MELB, W'PONDS   Book 2008
      Computer security and penetration testing / Alfred Basta and Wolf Halton BONUS, MELB, W'PONDS   Book 2008
005.8 Bas/Dis : Designing information systems security / Richard Baskerville     
      Designing information systems security / Richard Baskerville BONUS, W'PONDS   Book 1988
005.8 Bas/Dse : Database security / Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy     
      Database security / Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy BONUS, MELB   Book 2012
005.8 Bel/Fco : Formal correctness of security protocols / Giampaolo Bella     
      Formal correctness of security protocols / Giampaolo Bella BONUS, W'PONDS   Book 2007
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next