Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Eur/Cse 2004 : Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds     
      Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings / Pierangela Samarati ... [and others], eds BONUS, W'PONDS   Book 2004
005.8 Far/Fdi    
      Forensic discovery / Dan Farmer, Wietse Venema BONUS, MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema BONUS, MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema BONUS, MELB, W'PONDS   Book 2005
      Forensic discovery / Dan Farmer, Wietse Venema BONUS, MELB, W'PONDS   Book 2005
005.8 Fer/Tos    
      A taxonomy of security in Very large Scale networked RFID systems / Harinda Fernando and Jemal Abawajy BONUS, MELB, WATERFT ADPML   Book 2009
      A taxonomy of security in Very large Scale networked RFID systems / Harinda Fernando and Jemal Abawajy BONUS, MELB, WATERFT ADPML   Book 2009
005.8 Fet/Wai : Web and information security / Elena Ferrari and Bhavani Thuraisingham, editors     
      Web and information security / Elena Ferrari and Bhavani Thuraisingham, editors BONUS, W'PONDS   Book 2006
005.8 FireWa Wel/Ecp    
      Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide / Dameon D. Welch-Abernathy BONUS, MELB, W'PONDS   Book 2004
      Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide / Dameon D. Welch-Abernathy BONUS, MELB, W'PONDS   Book 2004
005.8 Fos/Boa    
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel BONUS, MELB, W'PONDS   Book 2005
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel BONUS, MELB, W'PONDS   Book 2005
005.8 Fos/Wst : Writing security tools and exploits / James C. Foster, Vincent Liu     
      Writing security tools and exploits / James C. Foster, Vincent Liu BONUS, MELB   Book 2006
005.8 Fri/Mds : Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried     
      Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried BONUS, MELB   Book 2010
005.8 Fro/Ccv : The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost]     
      The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost] BONUS, W'PONDS   Book 1989
005.8 Fuh/Msh : Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski     
      Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski BONUS, W'PONDS   Book 2005
005.8 Fun/Itp : Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others]     
      Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others] BONUS, W'PONDS   Book 2011
005.8 Fur/Mea : Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek     
      Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek BONUS, W'PONDS   Book 2005
005.8 Fur/Sia : Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors     
      Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors BONUS, MELB   Book 2008
005.8 Fut/Fss 2012 : Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others]     
      Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others] BONUS, W'PONDS   Book 2012
005.8 Gal/Cse : Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe     
      Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe BONUS, MELB   Book 2008
005.8 Gal/Phc : Protocol : how control exists after decentralization / Alexander R. Galloway     
      Protocol : how control exists after decentralization / Alexander R. Galloway BONUS, W'PONDS   Book 2004
005.8 Gar/Pua : Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford     
      Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford BONUS, MELB   Book 1996
005.8 Gar/Wsp : Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford     
      Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford BONUS, W'PONDS   Book 2002
005.8 Geb/Sie : Security in embedded devices / Catherine H. Gebotys     
      Security in embedded devices / Catherine H. Gebotys BONUS, W'PONDS   Book 2010
005.8 Ger/Hod : Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia     
      Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia BONUS, MELB   Book 2008
005.8 Gho/Ecs : E-commerce security and privacy / edited by Anup K. Ghosh     
      E-commerce security and privacy / edited by Anup K. Ghosh BONUS, W'PONDS   Book 2001
005.8 Gho/Nid : Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani     
      Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani BONUS, MELB   Book 2010
005.8 Gol/Cse : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann BONUS, MELB   Book 1999
005.8 Gol/Cse 2006 : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann BONUS, W'PONDS   Book 2006
005.8 Gol/Mcp : Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich     
      Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich BONUS, MELB   Book 1999
005.8 Goo/Ite    
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia BONUS, MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia BONUS, MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia BONUS, MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia BONUS, MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia BONUS, MELB, W'PONDS   Book 2011
005.8 Goo/Tas    
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
005.8 Gor/Pds : Practical data security / edited by John Gordon     
      Practical data security / edited by John Gordon BONUS, W'PONDS   Book 1993
005.8 Gra/Cse : Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson     
      Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson BONUS, MELB   Book 2011
005.8 Gra/Scp    
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk BONUS, MELB, W'PONDS   Book 2003
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk BONUS, MELB, W'PONDS   Book 2003
005.8 Gre/Cis    
      Cissp guide to security essentials / Peter Gregory BONUS, MELB, W'PONDS   Book 2010
      Cissp guide to security essentials / Peter Gregory BONUS, MELB, W'PONDS   Book 2010
005.8 Gre/Hts    
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins BONUS, MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins BONUS, MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins BONUS, MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins BONUS, MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins BONUS, MELB, W'PONDS   Book 2006
005.8 Gre/Ins : Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim     
      Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim BONUS, MELB   Book 2005
005.8 Gri/Vgt : Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors     
      Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors BONUS, MELB   Book 2008
005.8 Gtu/Ddi : A Guide to understanding design documentation in trusted systems     
      A Guide to understanding design documentation in trusted systems BONUS, W'PONDS   Book 1988
005.8 Gup/Hor    
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] BONUS, MELB   Book 2009
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] BONUS, MELB   Book 2009
      Handbook of research on emerging developments in data privacy / Manish Gupta, State University of New York Buffalo, USA BONUS, MELB   Book 2015
005.8 Gup/Sap : Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors     
      Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors BONUS, MELB   Book 2012
005.8 Gur/Hip : Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov     
      Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov BONUS, W'PONDS   Book 2008
005.8 Had/Set : Social engineering : the art of human hacking / by Christopher Hadnagy     
      Social engineering : the art of human hacking / by Christopher Hadnagy BONUS, MELB   Book 2011
005.8 Hal/Acc    
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert BONUS, MELB, W'PONDS   Book 2011
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert BONUS, MELB, W'PONDS   Book 2011
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert BONUS, MELB, W'PONDS   Book 2011
005.8 Har/Ghh : Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al]     
      Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al] BONUS, MELB   Book 2005
005.8 Har/Mag : Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti     
      Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti BONUS, W'PONDS   Book 2003
005.8 Har/Nsa : Network security : a practical approach / Jan L. Harrington     
      Network security : a practical approach / Jan L. Harrington BONUS, MELB   Book 2005
005.8 Hau/Sec : Security+ / Kirk Hausman, Diane Barrett, Martin Weiss     
      Security+ / Kirk Hausman, Diane Barrett, Martin Weiss BONUS, MELB   Book 2003
005.8 Haw/Sac : Security and control in information systems : a guide for business and accounting / Andrew Hawker     
      Security and control in information systems : a guide for business and accounting / Andrew Hawker BONUS, MELB   Book 2000
005.8 Hay/Ism : IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden     
      IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden BONUS, MELB   Book 2010
005.8 Hig/Cvh : Computer virus handbook / Harold Joseph Highland     
      Computer virus handbook / Harold Joseph Highland BONUS, W'PONDS   Book 1990
005.8 Him/Ish : Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma     
      Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma BONUS, MELB   Book 2007
005.8 Hog/Esh    
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw BONUS, MELB, W'PONDS   Book 2004
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw BONUS, MELB, W'PONDS   Book 2004
005.8 Hol/Ise    
      Internet security / Greg Holden BONUS, MELB, W'PONDS   Book 2003
      Internet security / Greg Holden BONUS, MELB, W'PONDS   Book 2003
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next