005.8 Chr/Spf 1997 : Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)
Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [and others] (eds.)
W'PONDS
1998
005.8 Cis/Sgt 2009
Security+ guide to network security fundamentals / Mark Ciampa
MELB, W'PONDS
2009
Security+ guide to network security fundamentals / Mark Ciampa
MELB, W'PONDS
2009
Security+ guide to network security fundamentals / Mark Ciampa
MELB, W'PONDS
2009
005.8 Cla/Est : Enterprise security : the manager's defense guide / David Leon Clark
Enterprise security : the manager's defense guide / David Leon Clark
W'PONDS
2003
005.8 Cla/Saa : The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List
The security, audit, and control of databases / edited by Rodney Clark, Simon Holloway, William List
W'PONDS
1991
005.8 Cof/Tca : Trust, complexity and control confidence in a convergent world / Piotr Cofta
Trust, complexity and control confidence in a convergent world / Piotr Cofta
W'PONDS
2007
005.8 Coh/Pas : Protection and security on the information superhighway / Frederick B. Cohen
Protection and security on the information superhighway / Frederick B. Cohen
W'PONDS
1995
005.8 Coh/Sco 1994 : A short course on computer viruses / Frederick B. Cohen
A short course on computer viruses / Frederick B. Cohen
W'PONDS
1994
005.8 Col/Hbe
Hackers beware / Eric Cole
MELB, W'PONDS
2001
Hackers beware / Eric Cole
MELB, W'PONDS
2001
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
W'PONDS
2006
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
MELB
2005
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
W'PONDS
1992
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
W'PONDS
2004
005.8 Con/Gsh
Googling security : how much does Google know about you? / Greg Conti
MELB, W'PONDS
2009
Googling security : how much does Google know about you? / Greg Conti
MELB, W'PONDS
2009
005.8 Con/Poc
Principles of computer security : Security+ and beyond / Wm. Arthur Conklin ... [and others]
W'PONDS
2004
Principles of computer security : Security+ and beyond / Wm. Arthur Conklin ... [and others]
W'PONDS
2004
005.8 Con/Poc 2010
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [and others]
W'PONDS
2010
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [and others]
W'PONDS
2010
005.8 Con/Poc 2012
Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others]
MELB, W'PONDS
2012
Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others]
MELB, W'PONDS
2012
Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others]
MELB, W'PONDS
2012
Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others]
MELB, W'PONDS
2012
4 additional entries
005.8 Con/Poc 2016
Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren
MELB, W'PONDS
2016
Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren
MELB, W'PONDS
2016
Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren
MELB, W'PONDS
2016
Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren
MELB, W'PONDS
2016
6 additional entries
005.8 Con/Sei : Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady
Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady
WATERFT
2014
005.8 Coo : Computer-security technology / James Arlin Cooper
Computer-security technology / James Arlin Cooper
W'PONDS
1984
005.8 Cox/Msw : Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg
Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg
W'PONDS
2004
005.8 Cra/Smc : Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen
Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen
MELB
2015
005.8 Cra/Wpw : Web privacy with P3P / Lorrie Faith Cranor
Web privacy with P3P / Lorrie Faith Cranor
MELB
2002
005.8 Cre/Osa
Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw
MELB, W'PONDS
2012
Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw
MELB, W'PONDS
2012
005.8 Cro/Sot 2008 : Scene of the cybercrime
Scene of the cybercrime
MELB
2008
005.8 Cru/Iis : Inside Internet security : what hackers don't want you to know - / Jeff Crume
Inside Internet security : what hackers don't want you to know - / Jeff Crume
MELB
2000
005.8 Csa/Con : Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California
Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California
W'PONDS
1996?
005.8 Dae/Dor : The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen
The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen
W'PONDS
2002
005.8 Dai/Fia : The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou
The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou
WATERFT ADPML
2005
005.8 Dam/Cri : Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors
Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors
W'PONDS
1996
005.8 Dam/Oss : Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini
Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini
MELB
2009
005.8 Dan/Pyo : Protect yourself online / Matthew Danda
Protect yourself online / Matthew Danda
W'PONDS
2001
005.8 Dar/Moi : The misuse of information systems : the impact of security countermeasures / John P. D'Arcy
The misuse of information systems : the impact of security countermeasures / John P. D'Arcy
W'PONDS
2007
005.8 Dav/Hem : Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters
MELB
2010
005.8 Dav/Scs : Securing client/server computer networks / Peter T. Davis, editor
Securing client/server computer networks / Peter T. Davis, editor
W'PONDS
1996
005.8 Def/occ : official certified Ethical Hacker Review Guide
official certified Ethical Hacker Review Guide
MELB
005.8 Def/Oce : Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt
Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt
W'PONDS
2010
005.8 Dei/Act : Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors
Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors
W'PONDS
2010
005.8 Dei/Adt
Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others]
W'PONDS, WATERFT
2008
Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others]
W'PONDS, WATERFT
2008
005.8 Den/Ugt : User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell
User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell
W'PONDS
2004
005.8 Des/Bai
Building an information security awareness program / Mark B. Desman
MELB, W'PONDS
2002
Building an information security awareness program / Mark B. Desman
MELB, W'PONDS
2002
005.8 Dhi/Ism : Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon
Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon
W'PONDS
2001
005.8 Dhi/Mis : Managing information system security / Gurpreet Dhillon
Managing information system security / Gurpreet Dhillon
W'PONDS
1997
005.8 Dhi/Poi : Principles of information systems security : text and cases / Gurpreet Dhillon
Principles of information systems security : text and cases / Gurpreet Dhillon
MELB
2006
005.8 Dip/Ids
Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini
MELB, W'PONDS
2008
Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini
MELB, W'PONDS
2008
005.8 Dou/Nsc : Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos
Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos
MELB
2007
005.8 DRM/TIC 2005 : Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reihaneh Safavi-Naini, Moti Yung (eds.)
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reiha
MELB
2006
005.8 Dua/Cai 2019 : Computer & internet security : a hands-on approach / Wenliang Du
Computer & internet security : a hands-on approach / Wenliang Du
MELB
2019
005.8 Dua/Dma : Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du
Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du
MELB
2010
005.8 Dul/Cti 2011 : CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney
CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney
MELB, W'PONDS
2011
005.8 Dun/Csa : Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty
Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty
W'PONDS
2008
Add Marked to Bag
Add All On Page
Add Marked to My Lists