Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)     
      Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.) BONUS, W'PONDS   Book 1999
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)     
      Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) BONUS, W'PONDS   Book 2000
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)     
      Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier BONUS, MELB   Book 2009
005.8 Iti/Isc 2010    
      Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 procee BONUS, MELB   Book 2010
      Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 procee BONUS, MELB   Book 2010
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.) BONUS, W'PONDS   Book 2004
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.) BONUS, W'PONDS   Book 2005
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)     
      Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.) BONUS, MELB   Book 2012
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge     
      Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge BONUS, W'PONDS   Book 2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)     
      Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.) BONUS, W'PONDS   Book 2005
005.8 Jac/Eis    
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs BONUS, MELB, W'PONDS   Book 2011
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs BONUS, MELB, W'PONDS   Book 2011
005.8 Jac/Itn    
      Introduction to network security / Douglas Jacobson BONUS, MELB, W'PONDS   Book 2009
      Introduction to network security / Douglas Jacobson BONUS, MELB, W'PONDS   Book 2009
005.8 Jaj/Csa    
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors BONUS, MELB, W'PONDS   Book 2010
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors BONUS, MELB, W'PONDS   Book 2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]     
      Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edi BONUS, W'PONDS   Book 1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan     
      Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan BONUS, W'PONDS   Book 2008
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski     
      Internet and intranet security management : risks and solutions / Lech Janczewski BONUS, W'PONDS   Book 2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor     
      Optical and digital techniques for information security / Bahram Javidi, editor BONUS, W'PONDS   Book 2005
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]     
      Java network security / Robert MacGregor ... [and others] BONUS, W'PONDS   Book 1998
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks     
      Java security / Scott Oaks BONUS, W'PONDS   Book 2001
005.8 Java Pis/Ejs : Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others]     
      Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others] BONUS, MELB   Book 2004
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson     
      Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson BONUS, W'PONDS   Book 2002
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones BONUS, W'PONDS   Book 2006
005.8 Kam/Nsa    
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail BONUS, MELB, W'PONDS   Book 2007
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail BONUS, MELB, W'PONDS   Book 2007
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane     
      PC security and virus protection : the ongoing war against information sabotage / Pamela Kane BONUS, W'PONDS   Book 1994
005.8 Kat/Itm    
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell BONUS, MELB, W'PONDS   Book 2007
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell BONUS, MELB, W'PONDS   Book 2007
005.8 Kau/Nsp 2002    
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner BONUS, MELB, W'PONDS   Book 2002
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner BONUS, MELB, W'PONDS   Book 2002
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]     
      Electronic commerce relationships : trust by design / Peter Keen ... [and others] BONUS, W'PONDS   Book 2000
005.8 Kem/Wis : Wireless Internet security : architecture and protocols / James Kempf     
      Wireless Internet security : architecture and protocols / James Kempf BONUS, MELB   Book 2008
005.8 Kim/Hpt    
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
005.8 Kin/Sad : Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu     
      Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu BONUS, MELB   Book 2001
005.8 Kin/Spt    
      Security+ training guide / Todd King and David Bittlingmeier BONUS, MELB, W'PONDS   Book 2003
      Security+ training guide / Todd King and David Bittlingmeier BONUS, MELB, W'PONDS   Book 2003
005.8 Kiz/Cns    
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
005.8 Kiz/Cns 2011    
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
005.8 Kiz/Gtc 2012    
      A guide to computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2012
      A guide to computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2012
005.8 Kna/Csa    
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp BONUS, MELB, W'PONDS   Book 2009
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp BONUS, MELB, W'PONDS   Book 2009
005.8 Kou/Pte : Payment technologies for E-commerce / Weidong Kou, [ed.]     
      Payment technologies for E-commerce / Weidong Kou, [ed.] BONUS, MELB   Book 2003
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich BONUS, W'PONDS   Book 1998
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich BONUS, MELB   Book 2003
005.8 Koz/Shd : The shellcoder's handbook : discovering and exploiting security holes / Jack Koziol ... [and others]     
      The shellcoder's handbook : discovering and exploiting security holes / Jack Koziol ... [and others] BONUS, W'PONDS   Book 2004
005.8 Kra/Aon : Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, Elisa Shahbazian     
      Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, Elisa Shahbazian BONUS, MELB   Book 2008
005.8 Kra/Itn : Introduction to network security / Neal Krawetz     
      Introduction to network security / Neal Krawetz BONUS, MELB   Book 2007
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser     
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser BONUS, MELB   Book 2002
005.8 Kru/Cpg    
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines BONUS, MELB, W'PONDS   Book 2003
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines BONUS, MELB, W'PONDS   Book 2003
005.8 Kru/Csa    
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines BONUS, MELB   Book 2010
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines BONUS, MELB   Book 2010
005.8 Kru/Ida : Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna     
      Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna BONUS, MELB   Book 2005
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors BONUS, MELB   Book 2013
005.8 Lar/Aws    
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi     
      Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi BONUS, MELB   Book 2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon BONUS, W'PONDS   Book 2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] BONUS, MELB   Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next