005.8 Fun/Itp : Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others]
Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others]
W'PONDS
2011
005.8 Fur/Mea : Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek
Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek
W'PONDS
2005
005.8 Fur/Sia : Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors
Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors
MELB
2008
005.8 Fut/Fss 2012 : Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others]
Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others]
W'PONDS
2012
005.8 Gal/Cse : Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe
Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe
MELB
2008
005.8 Gal/Phc : Protocol : how control exists after decentralization / Alexander R. Galloway
Protocol : how control exists after decentralization / Alexander R. Galloway
W'PONDS
2004
005.8 Gar/Pua : Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford
Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford
MELB
1996
005.8 Gar/Wsp : Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford
Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford
W'PONDS
2002
005.8 Geb/Sie : Security in embedded devices / Catherine H. Gebotys
Security in embedded devices / Catherine H. Gebotys
W'PONDS
2010
005.8 Ger/Hod : Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia
Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia
MELB
2008
005.8 Gho/Ecs : E-commerce security and privacy / edited by Anup K. Ghosh
E-commerce security and privacy / edited by Anup K. Ghosh
W'PONDS
2001
005.8 Gho/Nid : Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani
MELB
Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien
MELB, W'PONDS
2007
Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien
MELB, W'PONDS
2007
Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien
MELB, W'PONDS
2007
005.8 Gor/Pds : Practical data security / edited by John Gordon
Practical data security / edited by John Gordon
W'PONDS
1993
005.8 Gra/Cse : Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson
Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson
MELB
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
005.8 Gre/Ins : Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim
MELB
2005
005.8 Gri/Vgt : Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors
Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors
MELB
2008
005.8 Gtu/Ddi : A Guide to understanding design documentation in trusted systems
A Guide to understanding design documentation in trusted systems
W'PONDS
Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
MELB
2009
Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
MELB
2009
Handbook of research on emerging developments in data privacy / Manish Gupta, State University of New York Buffalo, USA
MELB
2015
005.8 Gup/Sap : Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors
Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors
MELB
2012
005.8 Gur/Hip : Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov
Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov
W'PONDS
2008
005.8 Had/Set : Social engineering : the art of human hacking / by Christopher Hadnagy
Social engineering : the art of human hacking / by Christopher Hadnagy
MELB