Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors BONUS, MELB   Book 2013
005.8 Lar/Aws    
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens BONUS, MELB, W'PONDS   Book 2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi     
      Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi BONUS, MELB   Book 2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon BONUS, W'PONDS   Book 2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] BONUS, MELB   Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] BONUS, MELB   Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) BONUS, W'PONDS   Book 2004
005.8 Linux Bau/Bss : Building secure servers with Linux / Michael D. Bauer     
      Building secure servers with Linux / Michael D. Bauer BONUS, MELB   Book 2002
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell BONUS, W'PONDS   Book 2000
005.8 Linux Zie/Lfi : Linux firewalls / Robert L. Ziegler, Carl B. Constantine     
      Linux firewalls / Robert L. Ziegler, Carl B. Constantine BONUS, MELB   Book 2002
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd BONUS, W'PONDS   Book 2003
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein BONUS, W'PONDS   Book 2002
005.8 Mal/Hns : Hardening network security / John Mallery ... [and others]     
      Hardening network security / John Mallery ... [and others] BONUS, MELB   Book 2005
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) BONUS, W'PONDS   Book 2006
005.8 Man/Paa    
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp BONUS, MELB, W'PONDS   Book 2007
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp BONUS, MELB, W'PONDS   Book 2007
005.8 Mao/Mct    
      Modern cryptography : theory and practice / Wenbo Mao BONUS, MELB, W'PONDS   Book 2004
      Modern cryptography : theory and practice / Wenbo Mao BONUS, MELB, W'PONDS   Book 2004
005.8 Mat/Ehs : Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew     
      Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew BONUS, MELB   Book 2003
005.8 May/Sct : Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis     
      Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis BONUS, W'PONDS   Book 2008
005.8 Mcc/Hes 2009 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz BONUS, MELB   Book 2009
005.8 Mcc/Poa    
      A profile of an information warfare attack / S. McCombie and M. Warren BONUS, MELB, WATERFT ADPML   Book 2000
      A profile of an information warfare attack / S. McCombie and M. Warren BONUS, MELB, WATERFT ADPML   Book 2000
005.8 Mcc/Wha : Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah     
      Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah BONUS, W'PONDS   Book 2002
005.8 Mcn/Nsa : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab BONUS, MELB   Book 2004
005.8 Mcn/Nsa 2008 : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab BONUS, MELB   Book 2008
005.8 Mcn/Soc : Secrets of computer espionage : tactics and countermeasures / Joel McNamara     
      Secrets of computer espionage : tactics and countermeasures / Joel McNamara BONUS, W'BOOL   Book 2003
005.8 Mer/Cgt : The complete guide to Internet security / Mark S. Merkow & James Breithaupt     
      The complete guide to Internet security / Mark S. Merkow & James Breithaupt BONUS, W'PONDS   CD-ROM 2000
005.8 Mer/Isp    
      Information security : principles and practices / Mark Merkow, James Breithaupt BONUS, MELB, W'PONDS   Book 2005
      Information security : principles and practices / Mark Merkow, James Breithaupt BONUS, MELB, W'PONDS   Book 2005
005.8 Micnet Fre/Pns    
      Programming .NET security / Adam Freeman and Allen Jones BONUS, MELB, W'PONDS   Book 2003
      Programming .NET security / Adam Freeman and Allen Jones BONUS, MELB, W'PONDS   Book 2003
005.8 Mil/Bhp    
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk BONUS, MELB, W'PONDS   Book 2005
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk BONUS, MELB, W'PONDS   Book 2005
005.8 Mil/Its : Is it safe? : protecting your computer, your business, and yourself online / Michael Miller     
      Is it safe? : protecting your computer, your business, and yourself online / Michael Miller BONUS, MELB   Book 2008
005.8 Mil/Sas 2011    
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg BONUS, MELB, W'PONDS   Book 2011
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg BONUS, MELB, W'PONDS   Book 2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]     
      Security information and event management (SIEM) implementation / David R. Miller ... [and others] BONUS, MELB   Book 2011
005.8 Min/Sia    
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns BONUS, MELB, W'PONDS   Book 2009
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns BONUS, MELB, W'PONDS   Book 2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher     
      Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher BONUS, MELB   Book 2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon     
      The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon BONUS, W'PONDS   Book 2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell     
      Trusted computing / edited by Chris Mitchell BONUS, W'PONDS   Book 2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]     
      Computer and intrusion forensics / George Mohay ... [and others] BONUS, W'PONDS   Book 2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]     
      Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others] BONUS, W'PONDS   Book 2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney     
      Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney BONUS, W'PONDS   Book 2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea     
      Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea BONUS, W'PONDS   Book 2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)     
      Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.) BONUS, W'PONDS   Book 2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]     
      Guide to computer forensics and investigations / Bill Nelson ... [and others] BONUS, W'PONDS   Book 2006
005.8 Nel/Gtc 2008    
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
3 additional entries    
005.8 Nel/Gtc 2010    
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
2 additional entries    
005.8 Nel/Gtc 2016    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
3 additional entries    
005.8 Nel/Gtc 2019    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
3 additional entries    
005.8 Netscr Cam/Cnf : Configuring NetScreen firewalls / Rob Cameron ... [and others]     
      Configuring NetScreen firewalls / Rob Cameron ... [and others] BONUS, W'PONDS   Book 2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou     
      Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan     
      Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan BONUS, MELB   Book 2000
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next