Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Pal/Aip : Authentication in public key encryption schemes / by Ana Palavestra     
      Authentication in public key encryption schemes / by Ana Palavestra MELB THESES  Book 2009
005.8 Pan/Cca    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book c2004
005.8 Pan/Cca 2010    
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
      Corporate computer and network security / Raymond R. Panko MELB, W'PONDS   Book 2010
005.8 Pan/Ptf : A performance testing framework for digital forensic tools / by Lei Pan     
      A performance testing framework for digital forensic tools / by Lei Pan W'PONDS THESES  Book 2007
005.8 Pap/Cip : Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi     
      Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi ONLINE, W'PONDS   E-book 2008
005.8 Paq/Bcf : The business case for network security : advocacy, governance, and ROI / Catherine Paquet, Warren Saxe     
      The business case for network security : advocacy, governance, and ROI / Catherine Paquet, Warren Saxe W'PONDS  Book 2005
005.8 Par/Nse    
      Network security / Terry Pardoe, Gordon F. Snyder MELB, W'PONDS   Book 2005
      Network security / Terry Pardoe, Gordon F. Snyder MELB, W'PONDS   Book 2005
005.8 Pas/Sat    
      Swarming attacks / K. Pascoe and M. Warren MELB, WATERFT ADPML   Book 2002
      Swarming attacks / K. Pascoe and M. Warren MELB, WATERFT ADPML   Book 2002
005.8 Pat/Sos : Security of self-organizing networks : MANET, WSN, WMN, VANET / edited by Al-Sakib Khan Pathan     
      Security of self-organizing networks : MANET, WSN, WMN, VANET / edited by Al-Sakib Khan Pathan MELB  Book 2011
005.8 Pau/Rsc    
      RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra MELB, W'PONDS   Book 2012
      RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra MELB, W'PONDS   Book 2012
005.8 Pea/Tcp : Trusted computing platforms : TCPA technology in context / Siani Pearson, editor ... [and others]     
      Trusted computing platforms : TCPA technology in context / Siani Pearson, editor ... [and others] W'PONDS  Book 2002
005.8 Pei/Swa    
      Security warrior / Cyrus Peikari and Anton Chuvakin MELB, W'PONDS   Book 2004
      Security warrior / Cyrus Peikari and Anton Chuvakin MELB, W'PONDS   Book 2004
005.8 Pel/Isf : Information security fundamentals / Thomas R. Peltier, Justin Peltier, John Blackley     
      Information security fundamentals / Thomas R. Peltier, Justin Peltier, John Blackley MELB  Book 2005
005.8 Pel/Isp    
      Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier MELB, W'PONDS   Book 2001
      Information security policies, procedures, and standards : guidelines for effective information security management / Thomas R. Peltier MELB, W'PONDS   Book 2001
005.8 Pel/Isr : Information security risk analysis / Thomas R. Peltier     
      Information security risk analysis / Thomas R. Peltier MELB  Book 2001
005.8 Pel/Isr 2005 : Information security risk analysis / Thomas R. Peltier     
      Information security risk analysis / Thomas R. Peltier MELB  Book 2005
005.8 Pep/Ira 2014 : Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia     
      Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia MELB  Book 2014
005.8 Pet/Spa : Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.)     
      Security, privacy and trust in modern data management / Milan Petković, Willem Jonker (eds.) W'PONDS  Book 2007
005.8 Pfi/Iht 1999 : Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.)     
      Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.) W'PONDS  Book 2000
005.8 Pfl/Sic 2003 : Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB  Book 2003
005.8 Pfl/Sic 2006    
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger MELB, W'BOOL, W'PONDS   Book 2007
005.8 Pie/Emi : Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaþs, Andrzej Piegat     
      Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaþs, Andrzej Piegat W'PONDS  Book 2004
005.8 Pie/Eog : The effectiveness of graphical authentication : an exploratory study / by Justin D. Pierce     
      The effectiveness of graphical authentication : an exploratory study / by Justin D. Pierce W'PONDS THESES  Book 2006
005.8 Pin/Nsa    
      Network science and cybersecurity / Robinson E. Pino, editor MELB, W'PONDS   Book 2014
      Network science and cybersecurity / Robinson E. Pino, editor MELB, W'PONDS   Book 2014
005.8 Pip/Isp : Information security : protecting the global enterprise / Donald L. Pipkin     
      Information security : protecting the global enterprise / Donald L. Pipkin MELB  Book 2000
005.8 Pit/Ids    
      Intrusion detection systems : an overview of protection / A. Pitts & M. Warren MELB, WATERFT ADPML   Book 2000
      Intrusion detection systems : an overview of protection / A. Pitts & M. Warren MELB, WATERFT ADPML   Book 2000
005.8 Pol/Avt : Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others]     
      Anti-virus tools and techniques for computer systems / W. Timothy Polk ... [and others] W'PONDS  Book 1995
005.8 Pom/Cac : Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others]     
      Cryptology and computational number theory / Carl Pomerance, editor ; [contributors] Shafi Goldwasser ... [and others] W'PONDS  Book 1990
005.8 Por/Git : Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others]     
      Global initiatives to secure cyberspace : an emerging landscape / edited by Michael Portnoy, Seymour Goodman ; contributors, Michael Portnoy . . . [and others] MELB  Book 2009
005.8 Pot/Ese : 802.11 security / Bruce Potter and Bob Fleck     
      802.11 security / Bruce Potter and Bob Fleck W'PONDS  Book 2002
005.8 Pou/Spe    
      Security + exam cram 2 lab manual / Don Poulton and Michael G. Solomon MELB, W'PONDS   Book 2005
      Security + exam cram 2 lab manual / Don Poulton and Michael G. Solomon MELB, W'PONDS   Book 2005
005.8 Pro/Pid    
      Practical intrusion detection handbook / Paul E. Proctor MELB, W'PONDS   Book 2001
      Practical intrusion detection handbook / Paul E. Proctor MELB, W'PONDS   Book 2001
005.8 Qia/Ias : Information assurance : dependability and security in networked systems / [edited by] Yi Qian ... [and others]     
      Information assurance : dependability and security in networked systems / [edited by] Yi Qian ... [and others] W'PONDS  Book 2008
005.8 Rad/Hos : Handbook of SCADA/control systems security / edited by Robert Radvanovsky, Jacob Brodsky     
      Handbook of SCADA/control systems security / edited by Robert Radvanovsky, Jacob Brodsky W'PONDS  Book 2013
005.8 Radius Has/Rad : RADIUS / Jonathan Hassell     
      RADIUS / Jonathan Hassell MELB  Book 2002
005.8 Raf/Asv : Applied security visualization / Rafael Marty     
      Applied security visualization / Rafael Marty MELB  Book 2009
005.8 Raj/Cir : Computer incident response and product security / Damir Rajnovic     
      Computer incident response and product security / Damir Rajnovic MELB  Book 2011
005.8 Ray/Sfa : Security framework and protocols for the internet of things / by Biblob Ray     
      Security framework and protocols for the internet of things / by Biblob Ray MELB THESES  CD-ROM 2015
005.8 Red/Sst : System survivability : the EASEL way / J. Redman and M.J. Warren     
      System survivability : the EASEL way / J. Redman and M.J. Warren WATERFT ADPML  Book 2003
005.8 Ree : Automatic data proceesing risk assessment / Susan K. Reed     
      Automatic data proceesing risk assessment / Susan K. Reed W'PONDS  Microform 1977
005.8 Reh/Ids    
      Intrusion detection systems with Snort : advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID / Rafeeq Ur Rehman MELB, W'PONDS   Book 2003
      Intrusion detection systems with Snort : advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID / Rafeeq Ur Rehman MELB, W'PONDS   Book 2003
005.8 Rei/Bfn    
      Biometrics for network security / Paul Reid MELB, W'PONDS   Book 2004
      Biometrics for network security / Paul Reid MELB, W'PONDS   Book 2004
005.8 Reu/Sob : The secure online business handbook : e-commerce, IT functionality & business continuity     
      The secure online business handbook : e-commerce, IT functionality & business continuity W'PONDS  Book 2004
005.8 Reu/Sob 2005 : The secure online business handbook : e-commerce, IT functionality & business continuity     
      The secure online business handbook : e-commerce, IT functionality & business continuity MELB  Book 2005
005.8 Ric/Aba : The Australian business assessment of computer user security : a national survey / Kelly Richards     
      The Australian business assessment of computer user security : a national survey / Kelly Richards ONLINE, W'PONDS   E-book 2009
005.8 Ric/Gtr : Geekonomics : the real cost of insecure software / David Rice     
      Geekonomics : the real cost of insecure software / David Rice W'PONDS  Book 2008
005.8 Ris/Bss : Bulletproof SSL and TLS / Ivan Ristić     
      Bulletproof SSL and TLS / Ivan Ristić MELB  Book 2014
005.8 Rit/Wos : Wireless operational security / John W. Rittinghouse, James F. Ransome     
      Wireless operational security / John W. Rittinghouse, James F. Ransome MELB  Book 2004
005.8 Roe/Sca : Scada / edited by Kevin Roebuck     
      Scada / edited by Kevin Roebuck W'PONDS  Book 2011
005.8 Rog/Sac : Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]     
      Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others] W'PONDS  Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next