Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Lia/Mfa : Multimedia forensics and security / Chang-Tsun Li [editor]     
      Multimedia forensics and security / Chang-Tsun Li [editor] BONUS, MELB   Book 2009
005.8 Lia/Raa : Reliable algorithms and attack detection schemes for network systems / by Ke Li     
      Reliable algorithms and attack detection schemes for network systems / by Ke Li MELB THESES  Book 2009
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] BONUS, MELB   Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) BONUS, W'PONDS   Book 2004
005.8 Linux Bau/Bss : Building secure servers with Linux / Michael D. Bauer     
      Building secure servers with Linux / Michael D. Bauer BONUS, MELB   Book 2002
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell BONUS, W'PONDS   Book 2000
005.8 Linux Zie/Lfi : Linux firewalls / Robert L. Ziegler, Carl B. Constantine     
      Linux firewalls / Robert L. Ziegler, Carl B. Constantine BONUS, MELB   Book 2002
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd BONUS, W'PONDS   Book 2003
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
      Security and policy driven computing / Lei Liu BONUS, MELB, W'PONDS   Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein BONUS, W'PONDS   Book 2002
005.8 Mal/Hns : Hardening network security / John Mallery ... [and others]     
      Hardening network security / John Mallery ... [and others] BONUS, MELB   Book 2005
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) BONUS, W'PONDS   Book 2006
005.8 Man/Paa    
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp BONUS, MELB, W'PONDS   Book 2007
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp BONUS, MELB, W'PONDS   Book 2007
005.8 Mao/Mct    
      Modern cryptography : theory and practice / Wenbo Mao BONUS, MELB, W'PONDS   Book 2004
      Modern cryptography : theory and practice / Wenbo Mao BONUS, MELB, W'PONDS   Book 2004
005.8 Mat/Ehs : Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew     
      Ethical hacking : student courseware / EC-Council ; developer, Thomas Mathew BONUS, MELB   Book 2003
005.8 May/Sct : Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis     
      Smart cards, tokens, security and applications / [edited] by Keith E. Mayes and Konstantinos Markantonakis BONUS, W'PONDS   Book 2008
005.8 Mcc/Hes 2009 : Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz     
      Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz BONUS, MELB   Book 2009
005.8 Mcc/Poa    
      A profile of an information warfare attack / S. McCombie and M. Warren BONUS, MELB, WATERFT ADPML   Book 2000
      A profile of an information warfare attack / S. McCombie and M. Warren BONUS, MELB, WATERFT ADPML   Book 2000
005.8 Mcc/Wha : Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah     
      Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah BONUS, W'PONDS   Book 2002
005.8 Mcn/Nsa : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab BONUS, MELB   Book 2004
005.8 Mcn/Nsa 2008 : Network security assessment / Chris McNab     
      Network security assessment / Chris McNab BONUS, MELB   Book 2008
005.8 Mcn/Soc : Secrets of computer espionage : tactics and countermeasures / Joel McNamara     
      Secrets of computer espionage : tactics and countermeasures / Joel McNamara BONUS, W'BOOL   Book 2003
005.8 Mer/Cgt : The complete guide to Internet security / Mark S. Merkow & James Breithaupt     
      The complete guide to Internet security / Mark S. Merkow & James Breithaupt BONUS, W'PONDS   CD-ROM 2000
005.8 Mer/Isp    
      Information security : principles and practices / Mark Merkow, James Breithaupt BONUS, MELB, W'PONDS   Book 2005
      Information security : principles and practices / Mark Merkow, James Breithaupt BONUS, MELB, W'PONDS   Book 2005
005.8 Micnet Fre/Pns    
      Programming .NET security / Adam Freeman and Allen Jones BONUS, MELB, W'PONDS   Book 2003
      Programming .NET security / Adam Freeman and Allen Jones BONUS, MELB, W'PONDS   Book 2003
005.8 Mil/Bhp    
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk BONUS, MELB, W'PONDS   Book 2005
      Black Hat physical device security : exploiting hardware and software / Drew Miller ; foreward by Michael Bednarczyk BONUS, MELB, W'PONDS   Book 2005
005.8 Mil/Its : Is it safe? : protecting your computer, your business, and yourself online / Michael Miller     
      Is it safe? : protecting your computer, your business, and yourself online / Michael Miller BONUS, MELB   Book 2008
005.8 Mil/Sas 2011    
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg BONUS, MELB, W'PONDS   Book 2011
      Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg BONUS, MELB, W'PONDS   Book 2011
005.8 Mil/Sie : Security information and event management (SIEM) implementation / David R. Miller ... [and others]     
      Security information and event management (SIEM) implementation / David R. Miller ... [and others] BONUS, MELB   Book 2011
005.8 Min/Sia    
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns BONUS, MELB, W'PONDS   Book 2009
      Security in an IPv6 environment / Daniel Minoli, Jake Kouns BONUS, MELB, W'PONDS   Book 2009
005.8 Mir/Ido 2005 : Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher     
      Internet denial of service : attack and defense mechanisms / Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher BONUS, MELB   Book 2004
005.8 Mit/Aod : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon     
      The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon BONUS, W'PONDS   Book 2002
005.8 Mit/Tco : Trusted computing / edited by Chris Mitchell     
      Trusted computing / edited by Chris Mitchell BONUS, W'PONDS   Book 2005
005.8 Moh/Cai : Computer and intrusion forensics / George Mohay ... [and others]     
      Computer and intrusion forensics / George Mohay ... [and others] BONUS, W'PONDS   Book 2003
005.8 Msr/Ast 2004 : Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others]     
      Monitoring, security, and rescue techniques in multiagent systems / [edited by] Barbara Dunin-Kȩplicz ... [and others] BONUS, W'PONDS   Book 2005
005.8 Nan/Ews : Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney     
      Expert web services security in the .NET platform / Brian Nantz and Laurence Moroney BONUS, W'PONDS   Book 2005
005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea     
      Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea BONUS, W'PONDS   Book 2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)     
      Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.) BONUS, W'PONDS   Book 2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]     
      Guide to computer forensics and investigations / Bill Nelson ... [and others] BONUS, W'PONDS   Book 2006
005.8 Nel/Gtc 2008    
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
      Guide to computer forensics and investigations / by Bill Nelson ... [and others] BONUS, MELB, W'PONDS   Book 2008
3 additional entries    
005.8 Nel/Gtc 2010    
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
      Guide to computer forensics and investigations / Nelson Philips, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2010
2 additional entries    
005.8 Nel/Gtc 2016    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart MELB, W'PONDS   Book 2015
3 additional entries    
005.8 Nel/Gtc 2019    
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
      Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart MELB, W'PONDS   Book 2019
3 additional entries    
005.8 Netscr Cam/Cnf : Configuring NetScreen firewalls / Rob Cameron ... [and others]     
      Configuring NetScreen firewalls / Rob Cameron ... [and others] BONUS, W'PONDS   Book 2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou     
      Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou WATERFT ADPML  Book 2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan     
      Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan BONUS, MELB   Book 2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors     
      Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors BONUS, W'PONDS   Book 2010
005.8 Nor/Inp    
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark BONUS, MELB, W'PONDS   Book 2003
      Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark BONUS, MELB, W'PONDS   Book 2003
005.8 Nor/Isa : Intrusion signatures and analysis / Stephen Northcutt ... [and others]     
      Intrusion signatures and analysis / Stephen Northcutt ... [and others] BONUS, W'PONDS   Book 2001
005.8 Nor/Nid 2000 : Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan     
      Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan BONUS, MELB   Book 2001
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next