Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Afy/Dsa    
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni MELB, W'PONDS   Book 2006
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni MELB, W'PONDS   Book 2006
      Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni MELB, W'PONDS   Book 2006
005.8 Alj/Ena    
      Electronic negotiation and security of exchanged information in e-commerce / by Raja Al-Jaljouli and Jemal Abawajy MELB, WATERFT ADPML   Book 2007
      Electronic negotiation and security of exchanged information in e-commerce / by Raja Al-Jaljouli and Jemal Abawajy MELB, WATERFT ADPML   Book 2007
005.8 All/Cgt : The CERT guide to system and network security practices / Julia H. Allen     
      The CERT guide to system and network security practices / Julia H. Allen MELB  Book 2001
005.8 Alp/Nsa : Network security : a decision and game-theoretic approach / Tansu Alpcan and Tamer Başar     
      Network security : a decision and game-theoretic approach / Tansu Alpcan and Tamer Başar MELB  Book 2011
005.8 Amo/Foc : Fundamentals of computer security technology / Edward G. Amoroso     
      Fundamentals of computer security technology / Edward G. Amoroso W'PONDS  Book 1994
005.8 And/Sas : Safe and secure computing systems / editor, T. Anderson     
      Safe and secure computing systems / editor, T. Anderson W'PONDS  Book 1989
005.8 And/Sea : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson     
      Security engineering : a guide to building dependable distributed systems / Ross J. Anderson MELB  Book 2001
005.8 And/Sea 2008    
      Security engineering : a guide to building dependable distributed systems / Ross J Anderson MELB, W'PONDS   Book 2008
      Security engineering : a guide to building dependable distributed systems / Ross J Anderson MELB, W'PONDS   Book 2008
005.8 Anj/Sfw : Security for wireless ad-hoc networks / by Farooq Anjum and Petros Mouchtaris     
      Security for wireless ad-hoc networks / by Farooq Anjum and Petros Mouchtaris WATERFT  Book 2007
005.8 Aso/Qdp : Querying databases privately : a new approach to private information retrieval / Dmitri Asonov     
      Querying databases privately : a new approach to private information retrieval / Dmitri Asonov MELB  Book 2004
005.8 Avo/Css : Computer system security : basic concepts and solved exercises / Gildas Avoine, Pascal Junod and Philippe Oechslin     
      Computer system security : basic concepts and solved exercises / Gildas Avoine, Pascal Junod and Philippe Oechslin MELB  Book 2007
005.8 Axe/Uid : Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands     
      Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands W'PONDS  Book 2006
005.8 Ayc/Saa    
      Spyware and adware / John Aycock MELB, W'PONDS   Book 2011
      Spyware and adware / John Aycock MELB, W'PONDS   Book 2011
005.8 Aza/Csm    
      Current security management & ethical issues of information technology / edited by Rasool Azari W'BOOL, W'PONDS   Book 2003
      Current security management & ethical issues of information technology / edited by Rasool Azari W'BOOL, W'PONDS   Book 2003
005.8 B922I2 : Introduction to data security and controls / Edward R. Buck, III     
      Introduction to data security and controls / Edward R. Buck, III MELB  Book 1991
005.8 Bac/Ide : Intrusion detection     
      Intrusion detection W'PONDS  Book 1999
005.8 Bal/Eha    
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
      Ethical hacking and penetration testing guide / Rafay Baloch MELB, W'PONDS   Book 2014
005.8 Bas/Ccs : CCSP SNRS exam certification guide / Greg Bastien, Sarah Nasseh, Christian Abera Degu     
      CCSP SNRS exam certification guide / Greg Bastien, Sarah Nasseh, Christian Abera Degu W'PONDS  Book 2005
005.8 Bas/Csa    
      Computer security and penetration testing / Alfred Basta and Wolf Halton MELB, W'PONDS   Book 2008
      Computer security and penetration testing / Alfred Basta and Wolf Halton MELB, W'PONDS   Book 2008
005.8 Bas/Dis : Designing information systems security / Richard Baskerville     
      Designing information systems security / Richard Baskerville W'PONDS  Book 1988
005.8 Bas/Dse : Database security / Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy     
      Database security / Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy MELB  Book 2012
005.8 Baz/Osi 2021 : Open source intelligence techniques : resources for searching and analyzing online information / Michael Bazzell     
      Open source intelligence techniques : resources for searching and analyzing online information / Michael Bazzell MELB  Book 2021
005.8 Bel/Fco : Formal correctness of security protocols / Giampaolo Bella     
      Formal correctness of security protocols / Giampaolo Bella W'PONDS  Book 2007
005.8 Bez/Pai : Privacy and identity management for life : 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.7/PrimeLife international summer school, Nice, France, September 7 - 11, 2009 ; revised selected papers / Michele Bezzi ... (ed.)     
      Privacy and identity management for life : 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.7/PrimeLife international summer school, Nice, France, September 7 - 11, 2009 ; revised selected papers / Michele Bezzi .. W'PONDS  Book 2010
005.8 Bid/Hoi    
      Handbook of information security / Hossein Bidgoli editor-in-chief MELB  Book 2006
      Handbook of information security / Hossein Bidgoli editor-in-chief MELB  Book 2006
005.8 Big/Bhm : Black hats : misfits, criminals, and scammers in the Internet age / John Biggs     
      Black hats : misfits, criminals, and scammers in the Internet age / John Biggs W'PONDS  Book 2004
005.8 Bir/Soh : Special ops : host and network security for Microsoft, UNIX, and Oracle / Erik Pace Birkholz ; special forward by Stuart McClure     
      Special ops : host and network security for Microsoft, UNIX, and Oracle / Erik Pace Birkholz ; special forward by Stuart McClure W'PONDS  Book 2003
005.8 Bis/Ite : Introduction to computer security / Matt Bishop     
      Introduction to computer security / Matt Bishop W'PONDS  Book 2005
005.8 Bis/Sic : Security in computing systems : challenges, approaches and solutions / Joachim Biskup     
      Security in computing systems : challenges, approaches and solutions / Joachim Biskup MELB  Book 2009
005.8 Ble/Tin    
      Trustworthy internet / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors MELB, W'PONDS   Book 2011
      Trustworthy internet / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors MELB, W'PONDS   Book 2011
      Trustworthy internet / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors MELB, W'PONDS   Book 2011
005.8 Bly/Ias : Information assurance : surviving in the information environment / Andrew Blyth and Gerald C. Kovacich     
      Information assurance : surviving in the information environment / Andrew Blyth and Gerald C. Kovacich W'PONDS  Book 2001
005.8 Bly/Ias 2006 : Information assurance : security in the information environment / Andrew Blyth and Gerald L. Kovacich     
      Information assurance : security in the information environment / Andrew Blyth and Gerald L. Kovacich MELB, W'PONDS   Book 2006
005.8 Boc/Dso : The dark side of the Internet : protecting yourself and your family from online criminals / Paul Bocij     
      The dark side of the Internet : protecting yourself and your family from online criminals / Paul Bocij MELB  Book 2006
005.8 Boc/Nse : .NET security / Jason Bock ... [and others]     
      .NET security / Jason Bock ... [and others] W'PONDS  Book 2002
005.8 Boy/Cop : Code of practice for cyber security in the built environment / [author, Hugh Boyes]     
      Code of practice for cyber security in the built environment / [author, Hugh Boyes] MELB  Book 2014
005.8 Boy/Isa 2005 : Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. González Nieto (eds.)     
      Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. González Nieto (eds.) W'PONDS  Book 2005
005.8 Bro/Ndg : The .NET developer's guide to Windows security / Keith Brown     
      The .NET developer's guide to Windows security / Keith Brown W'PONDS  Book 2004
005.8 Bru/Cit : Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito     
      Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito W'PONDS  Book 2005
005.8 Bru/Sid : Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey     
      Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey W'PONDS  Book 1997
005.8 Bur/Cds : Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies     
      Computer data security : a practical and legal guide to liability, loss prevention, and criminal & civil remedies W'PONDS  Book 1989
005.8 Cac/Hew 2010 : Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu     
      Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu MELB  Book 2010
005.8 Cae/Ish 1994 : Information security handbook / William Caelli, Dennis Longley, Michael Shain     
      Information security handbook / William Caelli, Dennis Longley, Michael Shain W'PONDS  Book 1994
005.8 Cal/Bgt : A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder     
      A business guide to information security : how to protect your company's IT assets, reduce risks and understand the law / Alan Calder MELB  Book 2005
005.8 Cal/Cfa : Computer forensics and privacy / Michael A. Caloyannides     
      Computer forensics and privacy / Michael A. Caloyannides MELB  Book 2001
005.8 Cal/Iig : International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins     
      International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder, Steve Watkins MELB  Book 2006
005.8 Cal/Isi : Information security intelligence : cryptographic principles and applications / Thomas Calabrese     
      Information security intelligence : cryptographic principles and applications / Thomas Calabrese MELB  Book 2004
005.8 Cal/Ppa 2004    
      Privacy protection and computer forensics / Michael A. Caloyannides MELB, W'PONDS   Book 2004
      Privacy protection and computer forensics / Michael A. Caloyannides MELB, W'PONDS   Book 2004
      Privacy protection and computer forensics / Michael A. Caloyannides MELB, W'PONDS   Book 2004
005.8 Cal/Tro : Ten rules of information security for the smaller business : a plain English guide / Alan Calder     
      Ten rules of information security for the smaller business : a plain English guide / Alan Calder MELB  Book 2008
005.8 Cam/Fci : Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (eds.)     
      Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Ca MELB  Book 2011
005.8 Can/Pri : Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian]     
      Privacy : what developers and IT professionals should know / J.C. Cannon ; [foreword by Ann Cavoukian] MELB  Book 2005
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next