Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Con/Poc 2012    
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] MELB, W'PONDS   Book 2012
      Principles of computer security : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [and others] MELB, W'PONDS   Book 2012
4 additional entries    
005.8 Con/Poc 2016    
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren MELB, W'PONDS   Book 2016
      Principles of computer security / Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren MELB, W'PONDS   Book 2016
6 additional entries    
005.8 Con/Sei : Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady     
      Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady WATERFT  Book 2014
005.8 Coo : Computer-security technology / James Arlin Cooper     
      Computer-security technology / James Arlin Cooper W'PONDS  Book 1984
005.8 Cox/Msw : Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg     
      Managing security with Snort and IDS tools / Kerry Cox and Christopher Gerg W'PONDS  Book 2004
005.8 Cra/Smc : Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen     
      Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen MELB  Book 2015
005.8 Cra/Wpw : Web privacy with P3P / Lorrie Faith Cranor     
      Web privacy with P3P / Lorrie Faith Cranor MELB  Book 2002
005.8 Cre/Osa    
      Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw MELB, W'PONDS   Book 2012
      Operational semantics and verification of security protocols / Cas Cremers, Sjouke Mauw MELB, W'PONDS   Book 2012
005.8 Cro/Sot 2008 : Scene of the cybercrime     
      Scene of the cybercrime MELB  Book 2008
005.8 Cru/Iis : Inside Internet security : what hackers don't want you to know - / Jeff Crume     
      Inside Internet security : what hackers don't want you to know - / Jeff Crume MELB  Book 2000
005.8 Csa/Con : Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California     
      Proceedings : 12th Annual computer security applications conference : December 9-13, 1996, San Diego California W'PONDS  Book 1996?
005.8 Dae/Dor : The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen     
      The design of Rijndael : AES--the Advanced Encryption Standard / Joan Daemen, Vincent Rijmen W'PONDS  Book 2002
005.8 Dai/Fia : The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou     
      The federated identity and access management architectures : a literature survey / by Zhuying Dai and Wanlei Zhou WATERFT ADPML  Book 2005
005.8 Dam/Cri : Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors     
      Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors W'PONDS  Book 1996
005.8 Dam/Oss : Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini     
      Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil el Ioini MELB  Book 2009
005.8 Dan/Pyo : Protect yourself online / Matthew Danda     
      Protect yourself online / Matthew Danda W'PONDS  Book 2001
005.8 Dar/Moi : The misuse of information systems : the impact of security countermeasures / John P. D'Arcy     
      The misuse of information systems : the impact of security countermeasures / John P. D'Arcy W'PONDS  Book 2007
005.8 Dav/Hem : Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters     
      Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters MELB  Book 2010
005.8 Dav/Scs : Securing client/server computer networks / Peter T. Davis, editor     
      Securing client/server computer networks / Peter T. Davis, editor W'PONDS  Book 1996
005.8 Def/occ : official certified Ethical Hacker Review Guide     
      official certified Ethical Hacker Review Guide MELB   
005.8 Def/Oce : Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt     
      Official certified ethical hacker review guide / Steven DeFino ; contributing authors, Barry Kaufman, Nick Valenteen, Larry Greenblatt W'PONDS  Book 2010
005.8 Dei/Act : Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors     
      Access controlled : the shaping of power, rights, and rule in cyberspace / Ronald Deibert ... [and others], editors W'PONDS  Book 2010
005.8 Dei/Adt    
      Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others] W'PONDS, WATERFT   Book 2008
      Access denied : the practice and policy of global Internet filtering / edited by Ronald Deibert ... [and others] W'PONDS, WATERFT   Book 2008
005.8 Den/Ugt : User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell     
      User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell W'PONDS  Book 2004
005.8 Des/Bai    
      Building an information security awareness program / Mark B. Desman MELB, W'PONDS   Book 2002
      Building an information security awareness program / Mark B. Desman MELB, W'PONDS   Book 2002
005.8 Dhi/Ism : Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon     
      Information security management : global challenges in the new millennium / [edited by] Gurpreet Dhillon W'PONDS  Book 2001
005.8 Dhi/Mis : Managing information system security / Gurpreet Dhillon     
      Managing information system security / Gurpreet Dhillon W'PONDS  Book 1997
005.8 Dhi/Poi : Principles of information systems security : text and cases / Gurpreet Dhillon     
      Principles of information systems security : text and cases / Gurpreet Dhillon MELB  Book 2006
005.8 Dip/Ids    
      Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini MELB, W'PONDS   Book 2008
      Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini MELB, W'PONDS   Book 2008
005.8 Dou/Nsc : Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos     
      Network security : current status and future directions / edited by Christos Douligeris ; Dimitrios N. Serpanos MELB  Book 2007
005.8 DRM/TIC 2005 : Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reihaneh Safavi-Naini, Moti Yung (eds.)     
      Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / Reiha MELB  Book 2006
005.8 Dua/Cai 2019 : Computer & internet security : a hands-on approach / Wenliang Du     
      Computer & internet security : a hands-on approach / Wenliang Du MELB  Book 2019
005.8 Dua/Dma : Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du     
      Data mining and machine learning in cybersecurity / edited by Sumeet Dua, Xian Du MELB  Book 2010
005.8 Dul/Cti 2011 : CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney     
      CompTIA security+ study guide : exam SY0-301 / Emmett Dulaney MELB, W'PONDS   Book 2011
005.8 Dun/Csa : Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty     
      Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty W'PONDS  Book 2008
005.8 Dun/Mma : Mobile malware attacks and defense / Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [and others]     
      Mobile malware attacks and defense / Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [and others] MELB  Book 2009
005.8 Dun/Pas    
      Power and security in the information age : investigating the role of the state in cyberspace / edited by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel MELB, W'PONDS   Book 2007
      Power and security in the information age : investigating the role of the state in cyberspace / edited by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel MELB, W'PONDS   Book 2007
005.8 Ear/Wsh : Wireless security handbook / Aaron E. Earle     
      Wireless security handbook / Aaron E. Earle W'PONDS  Book 2006
005.8 Eas/Csf : Computer security fundamentals / Chuck Easttom     
      Computer security fundamentals / Chuck Easttom W'PONDS  Book 2006
005.8 Eas/Nda : Network defense and countermeasures : principles and practices / Chuck Easttom     
      Network defense and countermeasures : principles and practices / Chuck Easttom W'PONDS  Book 2006
005.8 Edn/Res : Real 802.11 security : Wi-Fi protected access and 802.11i / Jon Edney and William A. Arbaugh     
      Real 802.11 security : Wi-Fi protected access and 802.11i / Jon Edney and William A. Arbaugh W'PONDS  Book 2004
005.8 Elb/Uaa    
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
      Understanding and applying cryptography and data security / Adam J. Elbirt MELB, W'PONDS   Book 2009
2 additional entries    
005.8 End/Ida    
      Intrusion detection & prevention / Carl Endorf, Eugene Schultz, Jim Mellander MELB, W'PONDS   Book 2004
      Intrusion detection & prevention / Carl Endorf, Eugene Schultz, Jim Mellander MELB, W'PONDS   Book 2004
005.8 Eri/Hta : Hacking : the art of exploitation / Jon Erickson     
      Hacking : the art of exploitation / Jon Erickson MELB, W'PONDS   Book 2003
005.8 Ethre Ore/Eps    
      Ethereal : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez MELB, W'PONDS   Book 2004
      Ethereal : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez MELB, W'PONDS   Book 2004
005.8 Etr/Ics 2006 : Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings / Günter, Müller (Ed.)     
      Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings / Günter, Müller (Ed.) W'PONDS  Book 2006
005.8 Ett/Ise : Information security / edited by J.E. Ettinger     
      Information security / edited by J.E. Ettinger W'PONDS  Book 1993
005.8 Eur/Cse 2000 : Computer security--ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000 : proceedings / Frédéric Cuppens ... [and others] (eds.)     
      Computer security--ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000 : proceedings / Frédéric Cuppens ... [and others] (eds.) W'PONDS  Book 2000
005.8 Eur/Cse 2004 : Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds     
      Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds W'PONDS  Book 2004
005.8 Far/Fdi    
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema MELB, W'PONDS   Book 2005
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next