Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Kna/Csa    
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp MELB, W'PONDS   Book 2009
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp MELB, W'PONDS   Book 2009
005.8 Kou/Pte : Payment technologies for E-commerce / Weidong Kou, [ed.]     
      Payment technologies for E-commerce / Weidong Kou, [ed.] MELB  Book 2003
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich W'PONDS  Book 1998
005.8 Kov/Iss 2003 : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich MELB  Book 2003
005.8 Kra/Itn : Introduction to network security / Neal Krawetz     
      Introduction to network security / Neal Krawetz MELB  Book 2007
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser     
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser MELB  Book 2002
005.8 Kru/Cpg    
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines MELB, W'PONDS   Book 2003
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines MELB, W'PONDS   Book 2003
005.8 Kru/Csa : Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines     
      Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines MELB  Book 2010
005.8 Kru/Ida : Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna     
      Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna MELB  Book 2005
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors MELB  Book 2013
005.8 Lar/Aws    
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens MELB, W'PONDS   Book 2000
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens MELB, W'PONDS   Book 2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi     
      Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi MELB  Book 2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon W'PONDS  Book 2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] MELB  Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] MELB  Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) W'PONDS  Book 2004
005.8 Linux Bau/Bss : Building secure servers with Linux / Michael D. Bauer     
      Building secure servers with Linux / Michael D. Bauer MELB  Book 2002
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell W'PONDS  Book 2000
005.8 Linux Zie/Lfi : Linux firewalls / Robert L. Ziegler, Carl B. Constantine     
      Linux firewalls / Robert L. Ziegler, Carl B. Constantine MELB  Book 2002
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd W'PONDS  Book 2003
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu MELB, W'PONDS   Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein W'PONDS  Book 2002
005.8 Mal/Hns : Hardening network security / John Mallery ... [and others]     
      Hardening network security / John Mallery ... [and others] MELB  Book 2005
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) W'PONDS  Book 2006
005.8 Man/Paa    
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp MELB, W'PONDS   Book 2007
005.8 Mao/Mct    
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
      Modern cryptography : theory and practice / Wenbo Mao MELB, W'PONDS   Book 2004
005.8 Mat/Ehs : Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew     
      Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew MELB  Book 2003
005.8 May/Sct : Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis     
      Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis W'PONDS  Book 2008
005.8 Mcc/Hes 2009 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz MELB  Book 2009
005.8 Mcc/Poa    
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
      A profile of an information warfare attack / S. McCombie and M. Warren MELB, WATERFT ADPML   Book 2000
005.8 Mcc/Wha : Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah     
      Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah W'PONDS  Book 2002
005.8 Mcn/Nsa : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2004
005.8 Mcn/Nsa 2008 : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab MELB  Book 2008
005.8 Mcn/Soc : Secrets of computer espionage : tactics and countermeasures / Joel McNamara     
      Secrets of computer espionage : tactics and countermeasures / Joel McNamara W'BOOL  Book 2003
005.8 Mer/Cgt : The complete guide to Internet security / Mark S. Merkow & James Breithaupt     
      The complete guide to Internet security / Mark S. Merkow & James Breithaupt W'PONDS  CD-ROM 2000
005.8 Mer/Isp    
      Information security : principles and practices / Mark Merkow, James Breithaupt MELB, W'PONDS   Book 2005
      Information security : principles and practices / Mark Merkow, James Breithaupt MELB, W'PONDS   Book 2005
005.8 Micnet Fre/Pns    
      Programming .NET security / Adam Freeman and Allen Jones MELB, W'PONDS   Book 2003
      Programming .NET security / Adam Freeman and Allen Jones MELB, W'PONDS   Book 2003
005.8 Mil/Bhp    
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk MELB, W'PONDS   Book 2005
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk MELB, W'PONDS   Book 2005
005.8 Mil/Its : Is it safe? : protecting your computer, your business, and yourself online / Michael Miller     
      Is it safe? : protecting your computer, your business, and yourself online / Michael Miller MELB  Book 2008
005.8 Mil/Sas 2011    
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg MELB, W'PONDS   Book 2011
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg MELB, W'PONDS   Book 2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]     
      Security information and event management (SIEM) implementation / David R. Miller ... [and others] MELB  Book 2011
005.8 Min/Sia    
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns MELB, W'PONDS   Book 2009
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns MELB, W'PONDS   Book 2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher     
      Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher MELB  Book 2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon     
      The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon W'PONDS  Book 2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell     
      Trusted computing / edited by Chris Mitchell W'PONDS  Book 2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]     
      Computer and intrusion forensics / George Mohay ... [and others] W'PONDS  Book 2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]     
      Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others] W'PONDS  Book 2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney     
      Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney W'PONDS  Book 2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea     
      Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea W'PONDS  Book 2006
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next