.NET security / Jason Bock ... [and others]
W'PONDS
2002
005.8 Boy/Cop : Code of practice for cyber security in the built environment / [author, Hugh Boyes]
Code of practice for cyber security in the built environment / [author, Hugh Boyes]
MELB
2014
005.8 Boy/Isa 2005 : Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. González Nieto (eds.)
Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. González Nieto (eds.)
W'PONDS
2005
005.8 Bro/Ndg : The .NET developer's guide to Windows security / Keith Brown
The .NET developer's guide to Windows security / Keith Brown
W'PONDS
2004
005.8 Bru/Cit : Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito
Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito
W'PONDS
2005
005.8 Bru/Sid : Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey
Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey
W'PONDS
1997
005.8 Bur/Cds : Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies
Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies
W'PONDS
1989
005.8 Cac/Hew 2010 : Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu
Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu
MELB
2010
005.8 Cae/Ish 1994 : Information security handbook / William Caelli, Dennis Longley, Michael Shain
Information security handbook / William Caelli, Dennis Longley, Michael Shain
W'PONDS
1994
005.8 Cal/Bgt : A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder
A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder
MELB
2005
005.8 Cal/Cfa : Computer forensics and privacy / Michael A. Caloyannides
Computer forensics and privacy / Michael A. Caloyannides
MELB
2001
005.8 Cal/Iig : International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins
International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins
MELB
2006
005.8 Cal/Isi : Information security intelligence : cryptographic principles and applications / Thomas Calabrese
Information security intelligence : cryptographic principles and applications / Thomas Calabrese
MELB
Privacy protection and computer forensics / Michael A. Caloyannides
MELB, W'PONDS
2004
Privacy protection and computer forensics / Michael A. Caloyannides
MELB, W'PONDS
2004
Privacy protection and computer forensics / Michael A. Caloyannides
MELB, W'PONDS
2004
005.8 Cal/Tro : Ten rules of information security for the smaller business : a plain English guide / Alan Calder
Ten rules of information security for the smaller business : a plain English guide / Alan Calder
MELB
2008
005.8 Cam/Fci : Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (eds.)
Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Ca
MELB
2011
005.8 Can/Pri : Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian]
Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian]
MELB
2005
005.8 Car/Dca : Data communications and network security / Houston H. Carr, Charles A. Snyder
Data communications and network security / Houston H. Carr, Charles A. Snyder
MELB
The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey
MELB, W'PONDS
2010
The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey
MELB, W'PONDS
2010
005.8 Car/Sci : Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council
Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Application
W'PONDS
1991
005.8 Car/Wfa : Windows forensics and incident recovery / Harlan Carvey
Windows forensics and incident recovery / Harlan Carvey
MELB
(ISC)2 CISSP certified information systems security professional official study guide & practice tests bundle / Mike Chapple, James Michael Stewart, Darril, David Seidl
MELB
2021
(ISC)2 CISSP certified information systems security professional official study guide & practice tests bundle / Mike Chapple, James Michael Stewart, Darril, David Seidl
MELB
2021
005.8 Cha/Pki : Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)
Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)
W'PONDS
2005
005.8 Che/Ias : Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen
Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen
MELB
2006
005.8 Che/Nse : National security / edited by H. Chen ... [and others]
National security / edited by H. Chen ... [and others]
MELB
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
W'PONDS
2006
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
MELB
2005
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
W'PONDS
1992
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
W'PONDS