Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)     
      Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.) BONUS, MELB   Book 2012
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge     
      Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge BONUS, W'PONDS   Book 2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)     
      Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.) BONUS, W'PONDS   Book 2005
005.8 Jac/Eis    
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs BONUS, MELB, W'PONDS   Book 2011
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs BONUS, MELB, W'PONDS   Book 2011
005.8 Jac/Itn    
      Introduction to network security / Douglas Jacobson BONUS, MELB, W'PONDS   Book 2009
      Introduction to network security / Douglas Jacobson BONUS, MELB, W'PONDS   Book 2009
005.8 Jaj/Csa    
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors BONUS, MELB, W'PONDS   Book 2010
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors BONUS, MELB, W'PONDS   Book 2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]     
      Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edi BONUS, W'PONDS   Book 1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan     
      Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan BONUS, W'PONDS   Book 2008
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski     
      Internet and intranet security management : risks and solutions / Lech Janczewski BONUS, W'PONDS   Book 2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor     
      Optical and digital techniques for information security / Bahram Javidi, editor BONUS, W'PONDS   Book 2005
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]     
      Java network security / Robert MacGregor ... [and others] BONUS, W'PONDS   Book 1998
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks     
      Java security / Scott Oaks BONUS, W'PONDS   Book 2001
005.8 Java Pis/Ejs : Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others]     
      Enterprise Java security : building secure J2EE applications / Marco Pistoia ... [and others] BONUS, MELB   Book 2004
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson     
      Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson BONUS, W'PONDS   Book 2002
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones BONUS, W'PONDS   Book 2006
005.8 Kam/Nsa    
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail BONUS, MELB, W'PONDS   Book 2007
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail BONUS, MELB, W'PONDS   Book 2007
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane     
      PC security and virus protection : the ongoing war against information sabotage / Pamela Kane BONUS, W'PONDS   Book 1994
005.8 Kat/Itm    
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell BONUS, MELB, W'PONDS   Book 2007
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell BONUS, MELB, W'PONDS   Book 2007
005.8 Kau/Nsp 2002    
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner BONUS, MELB, W'PONDS   Book 2002
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner BONUS, MELB, W'PONDS   Book 2002
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]     
      Electronic commerce relationships : trust by design / Peter Keen ... [and others] BONUS, W'PONDS   Book 2000
005.8 Kem/Wis : Wireless Internet security : architecture and protocols / James Kempf     
      Wireless Internet security : architecture and protocols / James Kempf BONUS, MELB   Book 2008
005.8 Kim/Hpt    
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 3 : practical guide to penetration testing / Peter Kim DPD, MELB, W'PONDS   Book 2018
5 additional entries    
005.8 Kin/Sad : Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu     
      Security architecture : design, deployment, and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu BONUS, MELB   Book 2001
005.8 Kin/Spt    
      Security+ training guide / Todd King and David Bittlingmeier BONUS, MELB, W'PONDS   Book 2003
      Security+ training guide / Todd King and David Bittlingmeier BONUS, MELB, W'PONDS   Book 2003
005.8 Kiz/Cns    
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza BONUS, MELB, W'PONDS   Book 2005
005.8 Kiz/Cns 2011    
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza BONUS, MELB, W'BOOL, W'PONDS   Book 2011
005.8 Kiz/Gtc 2012 : A guide to computer network security / Joseph Migga Kizza     
      A guide to computer network security / Joseph Migga Kizza BONUS, W'PONDS   Book 2012
005.8 Kna/Csa    
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp BONUS, MELB, W'PONDS   Book 2009
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp BONUS, MELB, W'PONDS   Book 2009
005.8 Kou/Pte : Payment technologies for E-commerce / Weidong Kou, [ed.]     
      Payment technologies for E-commerce / Weidong Kou, [ed.] BONUS, MELB   Book 2003
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich BONUS, W'PONDS   Book 1998
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich BONUS, MELB   Book 2003
005.8 Koz/Shd : The shellcoder's handbook : discovering and exploiting security holes / Jack Koziol ... [and others]     
      The shellcoder's handbook : discovering and exploiting security holes / Jack Koziol ... [and others] BONUS, W'PONDS   Book 2004
005.8 Kra/Itn : Introduction to network security / Neal Krawetz     
      Introduction to network security / Neal Krawetz BONUS, MELB   Book 2007
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser     
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser BONUS, MELB   Book 2002
005.8 Kru/Cpg    
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines BONUS, MELB, W'PONDS   Book 2003
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines BONUS, MELB, W'PONDS   Book 2003
005.8 Kru/Csa    
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines BONUS, MELB   Book 2010
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines BONUS, MELB   Book 2010
005.8 Kru/Ida : Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna     
      Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna BONUS, MELB   Book 2005
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors BONUS, MELB   Book 2013
005.8 Lar/Aws    
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi     
      Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi BONUS, MELB   Book 2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon BONUS, W'PONDS   Book 2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] BONUS, MELB   Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] BONUS, MELB   Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) BONUS, W'PONDS   Book 2004
005.8 Linux Bau/Bss : Building secure servers with Linux / Michael D. Bauer     
      Building secure servers with Linux / Michael D. Bauer BONUS, MELB   Book 2002
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell BONUS, W'PONDS   Book 2000
005.8 Linux Zie/Lfi : Linux firewalls / Robert L. Ziegler, Carl B. Constantine     
      Linux firewalls / Robert L. Ziegler, Carl B. Constantine BONUS, MELB   Book 2002
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd BONUS, W'PONDS   Book 2003
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next