Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
005.8 Car/Sci : Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council  1991 1
005.8 Car/Wfa : Windows forensics and incident recovery / Harlan Carvey  2005 1
005.8 Cas/Dse : Sicurezza del basi di dati. English  1995 1
005.8 Cer/Cys   2
005.8 Cha/Bif : Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky  1995 1
005.8 Cha/Bif 2000   2
005.8 Cha/Pki : Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)  2005 1
005.8 Che/Ias : Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen  2006 1
005.8 Che/Nse : National security / edited by H. Chen ... [and others]  2007 1
005.8 Che/Sod   2
005.8 Che/Stp   2
005.8 Chi/Had : Hack attacks denied : a complete guide to network lockdown / John Chirillo  2001 1
005.8 Chi/Har : Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo  2001 1
005.8 Cho/Cah : Cybersecurity and homeland security / Lin V. Choi editor  2005 1
005.8 Cho/Pws : Protecting web services from distributed denial of service attacks / by Ashley Chonka  2009 1
005.8 Cho/Rod   3
005.8 Chr/Spf 1997 : Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)  1998 1
005.8 Cis/Sgt   2
005.8 Cis/Sgt 2009   3
005.8 Cla/Est : Enterprise security : the manager's defense guide / David Leon Clark  2003 1
005.8 Cla/Saa : The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List  1991 1
005.8 Cob/Avt : Australia's vulnerability to information attack : towards a national information policy / Adam Cobb  1997 1
005.8 Cof/Tca : Trust, complexity and control confidence in a convergent world / Piotr Cofta  2007 1
005.8 Coh/Pas : Protection and security on the information superhighway / Frederick B. Cohen  1995 1
005.8 Coh/Sco 1994 : A short course on computer viruses / Frederick B. Cohen  1994 1
005.8 Col/Hbe   2
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring  2006 1
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley  2005 1
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]  1992 1
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley  2004 1
005.8 Con/Gsh   2
005.8 Con/Poc   3
005.8 Con/Poc 2010   3
005.8 Con/Poc 2012   10
005.8 Con/Poc 2016   10
005.8 Con/Sei : Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady  2014 1
005.8 Coo : Computer-security technology / James Arlin Cooper  1984 1
005.8 Cox/Msw : Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg  2004 1
005.8 Cra/Smc : Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen  2015 1
005.8 Cra/Wpw : Web privacy with P3P / Lorrie Faith Cranor  2002 1
005.8 Cre/Osa   2
005.8 Cro/Sot 2008 : Scene of the cybercrime  2008 1
005.8 Cru/Iis : Inside Internet security : what hackers don't want you to know - / Jeff Crume  2000 1
005.8 Csa/Con : Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California  1996? 1
005.8 Dae/Dor : The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen  2002 1
005.8 Dah/Wwa : Web warriors  2009 1
005.8 Dai/Fia : The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou  2005 1
005.8 Dam/Cri : Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors  1996 1
005.8 Dam/Oss : Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini  2009 1
005.8 Dan/Pyo : Protect yourself online / Matthew Danda  2001 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next