Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Chi/Har : Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo     
      Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo BONUS, MELB   Book 2001
005.8 Cho/Cah : Cybersecurity and homeland security / Lin V. Choi editor     
      Cybersecurity and homeland security / Lin V. Choi editor BONUS, W'PONDS   Book 2005
005.8 Cho/Pws : Protecting web services from distributed denial of service attacks / by Ashley Chonka     
      Protecting web services from distributed denial of service attacks / by Ashley Chonka MELB THESES  Book 2009
005.8 Cho/Rod    
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
      A review of distributed denial of service attacks and defence's models / by Ashley Chonka and Wanlei Zhou BONUS, MELB, W'PONDS, WATERFT ADPML   Book 2007
005.8 Chr/Spf 1997 : Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)     
      Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.) BONUS, W'PONDS   Book 1998
005.8 Cis/Sgt    
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2012
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2012
005.8 Cis/Sgt 2009    
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
      Security+ guide to network security fundamentals / Mark Ciampa BONUS, MELB, W'PONDS   Book 2009
005.8 Cla/Est : Enterprise security : the manager's defense guide / David Leon Clark     
      Enterprise security : the manager's defense guide / David Leon Clark BONUS, W'PONDS   Book 2003
005.8 Cla/Saa : The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List     
      The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List BONUS, W'PONDS   Book 1991
005.8 Cob/Avt : Australia's vulnerability to information attack : towards a national information policy / Adam Cobb     
      Australia's vulnerability to information attack : towards a national information policy / Adam Cobb BONUS, W'PONDS   Book 1997
005.8 Cof/Tca : Trust, complexity and control confidence in a convergent world / Piotr Cofta     
      Trust, complexity and control confidence in a convergent world / Piotr Cofta BONUS, W'PONDS   Book 2007
005.8 Coh/Pas : Protection and security on the information superhighway / Frederick B. Cohen     
      Protection and security on the information superhighway / Frederick B. Cohen BONUS, W'PONDS   Book 1995
005.8 Coh/Sco 1994 : A short course on computer viruses / Frederick B. Cohen     
      A short course on computer viruses / Frederick B. Cohen BONUS, W'PONDS   Book 1994
005.8 Col/Hbe    
      Hackers beware / Eric Cole BONUS, MELB, W'PONDS   Book 2001
      Hackers beware / Eric Cole BONUS, MELB, W'PONDS   Book 2001
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring     
      Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring BONUS, W'PONDS   Book 2006
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley     
      Network security bible / Eric Cole, Ronald Krutz, and James W. Conley BONUS, MELB   Book 2005
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]     
      Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others] BONUS, W'PONDS   Book 1992
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley     
      Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley BONUS, W'PONDS   Book 2004
005.8 Con/Gsh    
      Googling security : how much does Google know about you? / Greg Conti BONUS, MELB, W'PONDS   Book 2009
      Googling security : how much does Google know about you? / Greg Conti BONUS, MELB, W'PONDS   Book 2009
005.8 Con/Poc    
      Principles of computer security : Security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2004
      Principles of computer security : Security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2004
      Principles of computer security : Security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2004
005.8 Con/Poc 2010    
      Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2010
      Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2010
      Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2010
005.8 Con/Poc 2012    
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] BONUS, MELB, W'PONDS   Book 2012
6 additional entries    
005.8 Con/Poc 2016    
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren BONUS, MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren BONUS, MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren BONUS, MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren BONUS, MELB, W'PONDS   Book 2016
6 additional entries    
005.8 Con/Sei : Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady     
      Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady WATERFT  Book 2014
005.8 Coo : Computer-security technology / James Arlin Cooper     
      Computer-security technology / James Arlin Cooper BONUS, W'PONDS   Book 1984
005.8 Cox/Msw : Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg     
      Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg BONUS, W'PONDS   Book 2004
005.8 Cra/Smc : Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen     
      Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen MELB  Book 2015
005.8 Cra/Wpw : Web privacy with P3P / Lorrie Faith Cranor     
      Web privacy with P3P / Lorrie Faith Cranor BONUS, MELB   Book 2002
005.8 Cre/Osa    
      Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw BONUS, MELB, W'PONDS   Book 2012
      Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw BONUS, MELB, W'PONDS   Book 2012
005.8 Cro/Sot 2008 : Scene of the cybercrime     
      Scene of the cybercrime BONUS, MELB   Book 2008
005.8 Cru/Iis : Inside Internet security : what hackers don't want you to know - / Jeff Crume     
      Inside Internet security : what hackers don't want you to know - / Jeff Crume BONUS, MELB   Book 2000
005.8 Csa/Con : Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California     
      Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California BONUS, W'PONDS   Book 1996?
005.8 Dae/Dor : The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen     
      The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen BONUS, W'PONDS   Book 2002
005.8 Dah/Wwa : Web warriors     
      Web warriors W'PONDS  DVD video 2009
005.8 Dai/Fia : The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou     
      The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou WATERFT ADPML  Book 2005
005.8 Dam/Cri : Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors     
      Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors BONUS, W'PONDS   Book 1996
005.8 Dam/Oss : Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini     
      Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini BONUS, MELB   Book 2009
005.8 Dan/Pyo : Protect yourself online / Matthew Danda     
      Protect yourself online / Matthew Danda BONUS, W'PONDS   Book 2001
005.8 Dar/Moi : The misuse of information systems : the impact of security countermeasures / John P. D'Arcy     
      The misuse of information systems : the impact of security countermeasures / John P. D'Arcy BONUS, W'PONDS   Book 2007
005.8 Dav/Hem : Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters     
      Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters BONUS, MELB   Book 2010
005.8 Dav/Scs : Securing client/server computer networks / Peter T. Davis, editor     
      Securing client/server computer networks / Peter T. Davis, editor BONUS, W'PONDS   Book 1996
005.8 Def/Occ : Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt     
      Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt BONUS, MELB, W'PONDS   Book 2010
005.8 Def/Oce : Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt     
      Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt BONUS, MELB, W'PONDS   Book 2010
005.8 Dei/Act : Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors     
      Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors BONUS, W'PONDS   Book 2010
005.8 Dei/Adt    
      Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others] BONUS, W'PONDS, WATERFT   Book 2008
      Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others] BONUS, W'PONDS, WATERFT   Book 2008
005.8 Den/Cua 1991 : Computers under attack : intruders, worms, and viruses / edited by Peter J. Denning     
      Computers under attack : intruders, worms, and viruses / edited by Peter J. Denning BONUS, W'PONDS   Book 1991
005.8 Den/Ugt : User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell     
      User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell BONUS, W'PONDS   Book 2004
005.8 Des/Bai    
      Building an information security awareness program / Mark B. Desman BONUS, MELB, W'PONDS   Book 2002
      Building an information security awareness program / Mark B. Desman BONUS, MELB, W'PONDS   Book 2002
005.8 Dhi/Ism : Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon     
      Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon BONUS, W'PONDS   Book 2001
005.8 Dhi/Mis : Managing information system security / Gurpreet Dhillon     
      Managing information system security / Gurpreet Dhillon BONUS, W'PONDS   Book 1997
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next