Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Fos/Boa    
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel MELB, W'PONDS   Book 2005
      Buffer overflow attacks : detect, exploit, prevent / James C. Foster ... [and others] ; foreword by Dave Aitel MELB, W'PONDS   Book 2005
005.8 Fos/Wst : Writing security tools and exploits / James C. Foster, Vincent Liu     
      Writing security tools and exploits / James C. Foster, Vincent Liu MELB  Book 2006
005.8 Fri/Mds : Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried     
      Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried MELB  Book 2010
005.8 Fro/Ccv : The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost]     
      The complete computer virus handbook / [David Frost, Ian Beale, Chris Frost] W'PONDS  Book 1989
005.8 Fuh/Msh : Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski     
      Multimedia security handbook / editors-in-chief and authors: Borko Furht, Darko Kirovski W'PONDS  Book 2005
005.8 Fun/Itp : Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others]     
      Introduction to privacy-preserving data publishing : concepts and techniques / Benjamin C.M. Fung ... [and others] W'PONDS  Book 2011
005.8 Fur/Mea : Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek     
      Multimedia encryption and watermarking / by Borko Furht, Edin Muharemagic, Daniel Socek W'PONDS  Book 2005
005.8 Fur/Sia : Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors     
      Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell ... [and others], editors MELB  Book 2008
005.8 Fut/Fss 2012 : Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others]     
      Future security : 7th Security Research Conference Future Security 2012 Bonn, Germany, September 4-6, 2012. Proceedings / Nils Aschenbruck ... [and others] W'PONDS  Book 2012
005.8 Gal/Cse : Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe     
      Cyber security : economic strategies and public policy alternatives / Michael P. Gallaher, Albert N. Link, Brent Rowe MELB  Book 2008
005.8 Gal/Phc : Protocol : how control exists after decentralization / Alexander R. Galloway     
      Protocol : how control exists after decentralization / Alexander R. Galloway W'PONDS  Book 2004
005.8 Gar/Pua : Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford     
      Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford MELB  Book 1996
005.8 Gar/Wsp : Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford     
      Web security, privacy, and commerce / Simson Garfinkel with Gene Spafford W'PONDS  Book 2002
005.8 Geb/Sie : Security in embedded devices / Catherine H. Gebotys     
      Security in embedded devices / Catherine H. Gebotys W'PONDS  Book 2010
005.8 Ger/Hod : Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia     
      Handbook of database security : applications and trends / edited by Michael Gertz, Sushil Jajodia MELB  Book 2008
005.8 Gho/Ecs : E-commerce security and privacy / edited by Anup K. Ghosh     
      E-commerce security and privacy / edited by Anup K. Ghosh W'PONDS  Book 2001
005.8 Gho/Nid : Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani     
      Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani MELB  Book 2010
005.8 Gil/Eg : An executive guide identity & access management / Alasdair Gilchrist     
      An executive guide identity & access management / Alasdair Gilchrist MELB  Book 2018
005.8 Gol/Cse : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann MELB  Book 1999
005.8 Gol/Cse 2006 : Computer security / Dieter Gollmann     
      Computer security / Dieter Gollmann W'PONDS  Book 2006
005.8 Gol/Mcp : Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich     
      Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich MELB  Book 1999
005.8 Goo/Ite    
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
      Introduction to computer security / Michael T. Goodrich & Roberto Tamassia MELB, W'PONDS   Book 2011
005.8 Goo/Tas    
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
      Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Scien MELB, W'PONDS   Book 2007
005.8 Gor/Pds : Practical data security / edited by John Gordon     
      Practical data security / edited by John Gordon W'PONDS  Book 1993
005.8 Gra/Cse : Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson     
      Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson MELB  Book 2011
005.8 Gra/Scp    
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk MELB, W'PONDS   Book 2003
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk MELB, W'PONDS   Book 2003
005.8 Gre/Cis    
      Cissp guide to security essentials / Peter Gregory MELB, W'PONDS   Book 2010
      Cissp guide to security essentials / Peter Gregory MELB, W'PONDS   Book 2010
005.8 Gre/Hts    
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
      Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins MELB, W'PONDS   Book 2006
005.8 Gre/Ins : Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim     
      Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim MELB  Book 2005
005.8 Gri/Vgt : Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors     
      Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors MELB  Book 2008
005.8 Gtu/Ddi : A Guide to understanding design documentation in trusted systems     
      A Guide to understanding design documentation in trusted systems W'PONDS  Book 1988
005.8 Gup/Hor    
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] MELB  Book 2009
      Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors] MELB  Book 2009
      Handbook of research on emerging developments in data privacy / Manish Gupta, State University of New York Buffalo, USA MELB  Book 2015
005.8 Gup/Sap : Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors     
      Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors MELB  Book 2012
005.8 Gur/Hip : Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov     
      Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov W'PONDS  Book 2008
005.8 Had/Set : Social engineering : the art of human hacking / by Christopher Hadnagy     
      Social engineering : the art of human hacking / by Christopher Hadnagy MELB  Book 2011
005.8 Hal/Acc    
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert MELB, W'PONDS   Book 2011
      Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert MELB, W'PONDS   Book 2011
005.8 Har/Ghh : Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al]     
      Gray hat hacking : the ethical hacker's handbook / Shon Harris [et.al] MELB  Book 2005
005.8 Har/Mag : Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti     
      Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti W'PONDS  Book 2003
005.8 Har/Nsa : Network security : a practical approach / Jan L. Harrington     
      Network security : a practical approach / Jan L. Harrington MELB  Book 2005
005.8 Hau/Sec : Security+ / Kirk Hausman, Diane Barrett, Martin Weiss     
      Security+ / Kirk Hausman, Diane Barrett, Martin Weiss MELB  Book 2003
005.8 Haw/Sac : Security and control in information systems : a guide for business and accounting / Andrew Hawker     
      Security and control in information systems : a guide for business and accounting / Andrew Hawker MELB  Book 2000
005.8 Hay/Ism : IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden     
      IT security metrics : a practical framework for measuring security & protecting data / Lance Hayden MELB  Book 2010
005.8 Him/Ish : Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma     
      Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma MELB  Book 2007
005.8 Hog/Esh    
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw MELB, W'PONDS   Book 2004
      Exploiting software : how to break code / Greg Hoglund, Gary McGraw MELB, W'PONDS   Book 2004
005.8 Hol/Ise    
      Internet security / Greg Holden MELB, W'PONDS   Book 2003
      Internet security / Greg Holden MELB, W'PONDS   Book 2003
005.8 Hon/Kye 2004 : Know your enemy : learning about security threats / The Honeynet Project     
      Know your enemy : learning about security threats / The Honeynet Project MELB  Book 2004
005.8 Hru/Cva : Computer viruses and anti-virus warfare / Jan Hruska     
      Computer viruses and anti-virus warfare / Jan Hruska W'PONDS  Book 1990
005.8 Hus/Ica    
      Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby MELB, W'PONDS   Book 2004
      Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby MELB, W'PONDS   Book 2004
005.8 Hut/Iwc : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren     
      Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren MELB  Book 2001
005.8 Hys/Cii : Critical information infrastructures : resilience and protection / Maitland Hyslop     
      Critical information infrastructures : resilience and protection / Maitland Hyslop W'PONDS  Book 2007
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next