Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Int/Itg : Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization     
      Information technology, security techniques : Governance of information security = gouvernance de la sécurité de l'information / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Ito : Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire / International Organization for Standardization     
      Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire W'PONDS  Book 2014
005.8 Int/Itp : Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization     
      Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Itr : Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de l'information - exigences / International Organization for Standardization     
      Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de W'PONDS  Book 2013
005.8 Int/Its : Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security techniques]     
      Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security t W'PONDS  Book 2008
005.8 Int/Its 2012 : Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization for Standardization     
      Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization WATERFT  Book 2012
005.8 Int/Itu : Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuves numériques / International Organization for Standardization     
      Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acq W'PONDS  Book 2012
005.8 Int/Itv : Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization     
      Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization W'PONDS  Book 2013
005.8 Int/Sip 2005 : Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)     
      Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.) W'PONDS  Book 2005
005.8 Intern Che/Fai : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin     
      Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin W'PONDS  Book 1994
005.8 Intern Che/Fai 2003 : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin     
      Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin MELB  Book 2003
005.8 ios Mil/Ihh    
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
      iOS hacker's handbook / Charlie Miller ... [and others] MELB  Book 2012
005.8 Isc/Isc 2004 : Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.)     
      Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.) W'PONDS  Book 2004
005.8 Isc/Isc 2006 : Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.)     
      Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.) W'PONDS  Book 2006
005.8 Isd/Isa : Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.)     
      Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.) MELB  Book 2010
005.8 Iso/Csr 2019 : Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch (Eds.)     
      Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyn W'PONDS  Book 2019
005.8 Isp/Ecc 2005 : Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.)     
      Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.) W'PONDS  Book 2005
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)     
      Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.) W'PONDS  Book 1999
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)     
      Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) W'PONDS  Book 2000
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)     
      Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier MELB  Book 2009
005.8 Iti/Isc 2010 : Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings / Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.)     
      Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 procee MELB  Book 2010
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.) W'PONDS  Book 2004
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.) W'PONDS  Book 2005
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)     
      Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.) MELB  Book 2012
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge     
      Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge W'PONDS  Book 2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)     
      Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.) W'PONDS  Book 2005
005.8 Jac/Eis    
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs MELB, W'PONDS   Book 2011
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs MELB, W'PONDS   Book 2011
005.8 Jac/Itn    
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
005.8 Jaj/Csa    
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors MELB, W'PONDS   Book 2010
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors MELB, W'PONDS   Book 2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]     
      Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edi W'PONDS  Book 1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan     
      Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan W'PONDS  Book 2008
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski     
      Internet and intranet security management : risks and solutions / Lech Janczewski W'PONDS  Book 2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor     
      Optical and digital techniques for information security / Bahram Javidi, editor W'PONDS  Book 2005
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]     
      Java network security / Robert MacGregor ... [and others] W'PONDS  Book 1998
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks     
      Java security / Scott Oaks W'PONDS  Book 2001
005.8 Java Pis/Ejs : Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others]     
      Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others] MELB  Book 2004
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson     
      Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson W'PONDS  Book 2002
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones W'PONDS  Book 2006
005.8 Kam/Nsa    
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane     
      PC security and virus protection : the ongoing war against information sabotage / Pamela Kane W'PONDS  Book 1994
005.8 Kat/Itm    
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
005.8 Kau/Nsp 2002    
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner MELB, W'PONDS   Book 2002
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner MELB, W'PONDS   Book 2002
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]     
      Electronic commerce relationships : trust by design / Peter Keen ... [and others] W'PONDS  Book 2000
005.8 Kem/Wis : Wireless Internet security : architecture and protocols / James Kempf     
      Wireless Internet security : architecture and protocols / James Kempf MELB  Book 2008
005.8 Kim/Hpt    
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
005.8 Kim/Hpt 2018 : The hacker playbook 3 : practical guide to penetration testing / Peter Kim     
      The hacker playbook 3 : practical guide to penetration testing / Peter Kim DPD, MELB, W'PONDS   Book 2018
005.8 Kin/Sad : Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu     
      Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu MELB  Book 2001
005.8 Kin/Spt    
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
005.8 Kiz/Cns    
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
005.8 Kiz/Cns 2011    
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next