005.8 Nat/Arw 2005 : Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
Verification of infinite-state systems with applications to security / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea
W'PONDS
2006
005.8 Ned/Cii : Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
W'PONDS
2007
005.8 Nel/Gtc 2006 : Guide to computer forensics and investigations / Bill Nelson ... [and others]
Guide to computer forensics and investigations / Bill Nelson ... [and others]
W'PONDS
Configuring NetScreen firewalls / Rob Cameron ... [and others]
W'PONDS
2005
005.8 Ngo/Lse : Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
Literature survey : enterprise-wide identity and access management / Leanne Ngo and Wanlei Zhou
WATERFT ADPML
2004
005.8 Nic/Dyd : Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan
MELB
2000
005.8 Nin/Paa : Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
Privacy and anonymity in information management systems : new techniques for new practical problems / Jordi Nin, Javier Herranz, editors
W'PONDS
Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark
MELB, W'PONDS
2003
Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [and others] ; contributing authors, Mark
MELB, W'PONDS
2003
005.8 Nor/Isa : Intrusion signatures and analysis / Stephen Northcutt ... [and others]
Intrusion signatures and analysis / Stephen Northcutt ... [and others]
W'PONDS
2001
005.8 Nor/Nid 2000 : Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan
Network intrusion detection : an analyst's handbook / Stephan, Northcutt, Judy Novak, Donald McLachlan
MELB
2001
005.8 Opp/Asf : Authentication systems for secure networks / Rolf Oppliger
Authentication systems for secure networks / Rolf Oppliger
W'PONDS
1996
005.8 Opp/Iai : Internet and Intranet security / Rolf Oppliger
Internet and Intranet security / Rolf Oppliger
W'PONDS
How to cheat at managing information security / Mark Osborne
MELB, W'PONDS
2006
How to cheat at managing information security / Mark Osborne
MELB, W'PONDS
2006
005.8 Osh/Sic : Security in computer operating systems / G. O'Shea
Security in computer operating systems / G. O'Shea
W'PONDS
1991
005.8 Pai/Siw 2016 : Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)
Intelligence and security informatics : 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, proceedings / Michael Chau, G. Alan Wang, Hsinchun Chen, (Eds)
W'PONDS
2016
005.8 Pal/Aip : Authentication in public key encryption schemes / by Ana Palavestra
Authentication in public key encryption schemes / by Ana Palavestra
MELB THESES
Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier
MELB, W'PONDS
2001
Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier
MELB, W'PONDS
2001
005.8 Pel/Isr : Information security risk analysis / Thomas R. Peltier
Information security risk analysis / Thomas R. Peltier
MELB
2001
005.8 Pel/Isr 2005 : Information security risk analysis / Thomas R. Peltier
Information security risk analysis / Thomas R. Peltier
MELB
2005
005.8 Pep/Ira 2014 : Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia
Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia
MELB
2014
005.8 Pet/Spa : Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.)
Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.)
W'PONDS
2007
005.8 Pfi/Iht 1999 : Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.)
Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.)
W'PONDS
2000
005.8 Pfl/Sic 2003 : Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger
MELB
Intrusion detection systems : an overview of protection / A. Pitts & M. Warren
MELB, WATERFT ADPML
2000
Intrusion detection systems : an overview of protection / A. Pitts & M. Warren
MELB, WATERFT ADPML
2000
005.8 Pol/Avt : Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others]
Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others]
W'PONDS
1995
005.8 Pom/Cac : Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others]
Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others]
W'PONDS
1990
005.8 Por/Git : Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others]
Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others]
MELB
2009
005.8 Pot/Ese : 802.11 security / Bruce Potter and Bob Fleck
802.11 security / Bruce Potter and Bob Fleck
W'PONDS