Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Boc/Nse : .NET security / Jason Bock ... [and others]     
      .NET security / Jason Bock ... [and others] BONUS, W'PONDS   Book 2002
005.8 Boy/Cop : Code of practice for cyber security in the built environment / [author, Hugh Boyes]     
      Code of practice for cyber security in the built environment / [author, Hugh Boyes] MELB  Book 2014
005.8 Boy/Isa 2005 : Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. Gonz├ílez Nieto (eds.)     
      Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. Gonz├ílez Nieto (eds.) BONUS, W'PONDS   Book 2005
005.8 Bro/Ndg : The .NET developer's guide to Windows security / Keith Brown     
      The .NET developer's guide to Windows security / Keith Brown BONUS, W'PONDS   Book 2004
005.8 Bru/Cit : Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito     
      Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito BONUS, W'PONDS   Book 2005
005.8 Bru/Sid : Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey     
      Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey BONUS, W'PONDS   Book 1997
005.8 Bur/Cds : Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies     
      Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies BONUS, W'PONDS   Book 1989
005.8 Cac/Hew 2010 : Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu     
      Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu BONUS, MELB   Book 2010
005.8 Cae/Ish : Information security handbook / [edited by] William Caelli, Dennis Longley, Michael Shain     
      Information security handbook / [edited by] William Caelli, Dennis Longley, Michael Shain BONUS, W'PONDS   Book 1991
005.8 Cae/Ish 1994 : Information security handbook / William Caelli, Dennis Longley, Michael Shain     
      Information security handbook / William Caelli, Dennis Longley, Michael Shain BONUS, W'PONDS   Book 1994
005.8 Cal/Bgt : A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder     
      A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder BONUS, MELB   Book 2005
005.8 Cal/Cfa : Computer forensics and privacy / Michael A. Caloyannides     
      Computer forensics and privacy / Michael A. Caloyannides BONUS, MELB   Book 2001
005.8 Cal/Iig : International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins     
      International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins BONUS, MELB   Book 2006
005.8 Cal/Isi : Information security intelligence : cryptographic principles and applications / Thomas Calabrese     
      Information security intelligence : cryptographic principles and applications / Thomas Calabrese BONUS, MELB   Book 2004
005.8 Cal/Ppa 2004    
      Privacy protection and computer forensics / Michael A. Caloyannides BONUS, MELB, W'PONDS   Book 2004
      Privacy protection and computer forensics / Michael A. Caloyannides BONUS, MELB, W'PONDS   Book 2004
      Privacy protection and computer forensics / Michael A. Caloyannides BONUS, MELB, W'PONDS   Book 2004
005.8 Cal/Tro : Ten rules of information security for the smaller business : a plain English guide / Alan Calder     
      Ten rules of information security for the smaller business : a plain English guide / Alan Calder BONUS, MELB   Book 2008
005.8 Cam/Fci : Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (eds.)     
      Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Ca BONUS, MELB   Book 2011
005.8 Can/Pri : Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian]     
      Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian] BONUS, MELB   Book 2005
005.8 Car/Dca : Data communications and network security / Houston H. Carr, Charles A. Snyder     
      Data communications and network security / Houston H. Carr, Charles A. Snyder BONUS, MELB   Book 2007
005.8 Car/Mon    
      The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey BONUS, MELB, W'PONDS   Book 2010
      The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey BONUS, MELB, W'PONDS   Book 2010
      The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey BONUS, MELB, W'PONDS   Book 2010
005.8 Car/Sci : Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council     
      Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Application BONUS, W'PONDS   Book 1991
005.8 Car/Wfa : Windows forensics and incident recovery / Harlan Carvey     
      Windows forensics and incident recovery / Harlan Carvey BONUS, MELB   Book 2005
005.8 Cas/Dse : Sicurezza del basi di dati. English     
      Database security / Silvano Castano ... [and others] BONUS, W'PONDS   Book 1995
005.8 Cer/Cys    
      Crackproof your software : the best ways to protect your software against crackers / Pavol Cerven BONUS, MELB, W'PONDS   Book 2002
      Crackproof your software : the best ways to protect your software against crackers / Pavol Cerven BONUS, MELB, W'PONDS   Book 2002
005.8 Cha/Bif : Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky     
      Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky BONUS, W'PONDS   Book 1995
005.8 Cha/Bif 2000    
      Building Internet firewalls / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman BONUS, MELB, W'PONDS   Book 2000
      Building Internet firewalls / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman BONUS, MELB, W'PONDS   Book 2000
005.8 Cha/Pki : Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)     
      Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.) BONUS, W'PONDS   Book 2005
005.8 Che/Ias : Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen     
      Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen BONUS, MELB   Book 2006
005.8 Che/Nse : National security / edited by H. Chen ... [and others]     
      National security / edited by H. Chen ... [and others] BONUS, MELB   Book 2007
005.8 Che/Sod    
      Simulation of distributed denial of service attacks / Ricky Chien-Neng Chen, Wei Shi ; supervised by Wanlei Zhou BONUS, MELB, WATERFT ADPML   Book 2004
      Simulation of distributed denial of service attacks / Ricky Chien-Neng Chen, Wei Shi ; supervised by Wanlei Zhou BONUS, MELB, WATERFT ADPML   Book 2004
005.8 Che/Stp    
      Secure transaction protocol analysis : models and applications / Qinggeng Chen, Chengqi Zhang, Shichao Zhang BONUS, MELB, WATERFT ADPML   Book 2008
      Secure transaction protocol analysis : models and applications / Qinggeng Chen, Chengqi Zhang, Shichao Zhang BONUS, MELB, WATERFT ADPML   Book 2008
005.8 Chi/Had : Hack attacks denied : a complete guide to network lockdown / John Chirillo     
      Hack attacks denied : a complete guide to network lockdown / John Chirillo BONUS, MELB   Book 2001
005.8 Chi/Har : Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo     
      Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo BONUS, MELB   Book 2001
005.8 Cho/Cah : Cybersecurity and homeland security / Lin V. Choi editor     
      Cybersecurity and homeland security / Lin V. Choi editor BONUS, W'PONDS   Book 2005
005.8 Cho/Pws : Protecting web services from distributed denial of service attacks / by Ashley Chonka     
      Protecting web services from distributed denial of service attacks / by Ashley Chonka MELB THESES  Book 2009
005.8 Cho/Rod    
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
005.8 Chr/Spf 1997 : Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)     
      Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.) BONUS, W'PONDS   Book 1998
005.8 Cis/Sgt    
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2012
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2012
005.8 Cis/Sgt 2009    
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
005.8 Cla/Est : Enterprise security : the manager's defense guide / David Leon Clark     
      Enterprise security : the manager's defense guide / David Leon Clark BONUS, W'PONDS   Book 2003
005.8 Cla/Saa : The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List     
      The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List BONUS, W'PONDS   Book 1991
005.8 Cob/Avt : Australia's vulnerability to information attack : towards a national information policy / Adam Cobb     
      Australia's vulnerability to information attack : towards a national information policy / Adam Cobb BONUS, W'PONDS   Book 1997
005.8 Cof/Tca : Trust, complexity and control confidence in a convergent world / Piotr Cofta     
      Trust, complexity and control confidence in a convergent world / Piotr Cofta BONUS, W'PONDS   Book 2007
005.8 Coh/Pas : Protection and security on the information superhighway / Frederick B. Cohen     
      Protection and security on the information superhighway / Frederick B. Cohen BONUS, W'PONDS   Book 1995
005.8 Coh/Sco 1994 : A short course on computer viruses / Frederick B. Cohen     
      A short course on computer viruses / Frederick B. Cohen BONUS, W'PONDS   Book 1994
005.8 Col/Hbe    
      Hackers beware / Eric Cole BONUS, MELB, W'PONDS   Book 2001
      Hackers beware / Eric Cole BONUS, MELB, W'PONDS   Book 2001
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring     
      Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring BONUS, W'PONDS   Book 2006
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley     
      Network security bible / Eric Cole, Ronald Krutz, and James W. Conley BONUS, MELB   Book 2005
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]     
      Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others] BONUS, W'PONDS   Book 1992
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley     
      Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley BONUS, W'PONDS   Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next