Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens
MELB, W'PONDS
2000
Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens
MELB, W'PONDS
2000
005.8 Lau/Maw : Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi
Mobile and wireless networks security : proceedings of the MWNS 2008 Workshop, Singapore, 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi
MELB
2008
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon
Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon
W'PONDS
2007
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]
Multimedia forensics and security / Chang-Tsun Li [editor]
MELB
2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li
Reliable algorithms and attack detection schemes for network systems / by Ke Li
MELB THESES
2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]
MELB
2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)
Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)
W'PONDS
Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg
MELB, W'PONDS
2011
Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg
MELB, W'PONDS
2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]
Security information and event management (SIEM) implementation / David R. Miller ... [and others]
MELB
Security in an IPv6 environment / Daniel Minoli, Jake Kouns
MELB, W'PONDS
2009
Security in an IPv6 environment / Daniel Minoli, Jake Kouns
MELB, W'PONDS
2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
MELB
2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon
The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon
W'PONDS
2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell
Trusted computing / edited by Chris Mitchell
W'PONDS
2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]
Computer and intrusion forensics / George Mohay ... [and others]
W'PONDS
2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]
Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]
W'PONDS
2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney
Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney
W'PONDS
2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
W'PONDS
2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
W'PONDS
2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]
Guide to computer forensics and investigations / Bill Nelson ... [and others]
W'PONDS
Configuring NetScreen firewalls / Rob Cameron ... [and others]
W'PONDS
2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
WATERFT ADPML
2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
MELB
2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
W'PONDS