Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network / Michael Gregg ... [and others] ; technical editor, Stephen Watkins
MELB, W'PONDS
2006
005.8 Gre/Ins : Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim
MELB
2005
005.8 Gri/Vgt : Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors
Virtual goods : technology, economy, and legal aspects / Rüdiger Grimm, Berthold H. Hass and Jürgen Nützel, editors
MELB
2008
005.8 Gtu/Ddi : A Guide to understanding design documentation in trusted systems
A Guide to understanding design documentation in trusted systems
W'PONDS
Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
MELB
2009
Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
MELB
2009
Handbook of research on emerging developments in data privacy / Manish Gupta, State University of New York Buffalo, USA
MELB
2015
005.8 Gup/Sap : Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors
Strategic and practical approaches for information security governance : technologies and applied solutions / Manish Gupta, John Walp, Raj Sharman, editors
MELB
2012
005.8 Gur/Hip : Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov
Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov
W'PONDS
2008
005.8 Had/Set : Social engineering : the art of human hacking / by Christopher Hadnagy
Social engineering : the art of human hacking / by Christopher Hadnagy
MELB
Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby
MELB, W'PONDS
2004
Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby
MELB, W'PONDS
2004
005.8 Hut/Iwc : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren
Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Mat Warren
MELB
2001
005.8 Hys/Cii : Critical information infrastructures : resilience and protection / Maitland Hyslop
Critical information infrastructures : resilience and protection / Maitland Hyslop
W'PONDS
2007
005.8 Ico/Eap 2010 : Ethics and policy of biometrics : third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised selected papers / Ajay Kumar, David Zhang (eds.)
Ethics and policy of biometrics : third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised selected papers / A
MELB
2010
005.8 Ico/Ges 2008 : Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings / Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown (eds.)
Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings / Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown (eds.)
MELB
2008
005.8 Ico/Iss 2006 : Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / Aditya Bagchi, Vijayalakshmi Atluri (Eds.)
Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / Aditya Bagchi, Vijayalakshmi Atluri (Eds.)
MELB
2006
005.8 Ico/Nas 2015 : Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings / edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings / edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
MELB
2015
005.8 Iee/Pis : Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California
Proceedings 1997 IEEE Symposium on Security and Privacy ; May 4-7, 1997 : Oakland, California
W'PONDS
1997
005.8 Ifi : Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H. Finch and E. Graham Dougall
Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 / edited by James H.
W'PONDS
1984
005.8 Ifi/Csp 1993 : Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall
Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall
W'PONDS
1993
005.8 Ifi/Dsv : Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E. Landwehr
Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Data Base Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 / edited by Thomas F. Keefe, Carl E
W'PONDS
The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad
MELB, W'PONDS
2008
The future of identity in the information society : proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad
MELB, W'PONDS
Policies and research in identity management : first IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN '07), RSM Erasmus University, Rotterdam, The Netherlands, Octo
W'PONDS
2008
The future of identity in the information society : 4th IFIP WG 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September 1-7, 2008, revised selected papers / Vashek Matyá
W'PONDS
2009
005.8 Ifi/Sac 1993 : Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and ashore at St. Peterburg, Russia, 12-17 August 1993 / edited by Richard Sizer ... [and others]
Security and control of information technology in society : proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and asho
W'PONDS
1994
005.8 Int/Daa : Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edited by Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA / edit
W'PONDS
2004
005.8 Int/Iac 1997 : Information and communications security : first international conference, ICIS'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.)
Information and communications security : first international conference, ICIS'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.)
W'PONDS
1997
005.8 Int/Iac 1999 : Information and communication security : second international conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds
Information and communication security : second international conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds
W'PONDS
1999
005.8 Int/Isa : Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / Choonsik Park, Seongtaek Chee (eds.)
Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / Choonsik Park, Seongtaek Chee (eds.)
W'PONDS
2005
005.8 Int/Itc : Information technology, security techniques : code of practice for information security controls = Technologies de l'information - techniques de sécurité : code de bonne pratique pour le management de la sécurité de l'information / International Organization for Standardization
Information technology, security techniques : code of practice for information security controls = Technologies de l'information - techniques de sécurité : code de bonne pratique pour le management de
W'PONDS
2013
005.8 Int/Itg : Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization
Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization
W'PONDS
2013
005.8 Int/Ito : Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire / International Organization for Standardization
Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire
W'PONDS
2014
005.8 Int/Itp : Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization
Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization
W'PONDS
2013
005.8 Int/Itr : Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de l'information - exigences / International Organization for Standardization
Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de
W'PONDS
2013
005.8 Int/Its : Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security techniques]
Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security t
W'PONDS
2008
005.8 Int/Its 2012 : Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization for Standardization
Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization
WATERFT
2012
005.8 Int/Itu : Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuves numériques / International Organization for Standardization
Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acq
W'PONDS
2012
005.8 Int/Itv : Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization
Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization
W'PONDS
2013
005.8 Int/Sip 2005 : Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)
Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)
W'PONDS