005.8 Rog/Sac : Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]
Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]
W'PONDS
2004
005.8 Ros/Sws : Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy
W'PONDS
2004
005.8 Rot/Cta : Complexity theory and cryptology : an introduction to cryptocomplexity / Jörg Rothe
Complexity theory and cryptology : an introduction to cryptocomplexity / Jörg Rothe
MELB
2005
005.8 Rua/Pes : Platform embedded security technology revealed : safeguarding the future of computing with Intel embedded security and management engine / Xiaoyu Ruan
Platform embedded security technology revealed : safeguarding the future of computing with Intel embedded security and management engine / Xiaoyu Ruan
MELB
2014
005.8 Rub/Wss : Web security sourcebook / Aviel D. Rubin, Daniel Greer, Marcus J. Ranum
Web security sourcebook / Aviel D. Rubin, Daniel Greer, Marcus J. Ranum
W'PONDS
1997
005.8 Rup/Sgc : Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman
Smart grid cybersecurity guidelines and interoperability standards / editors, Paul D. Rupp and Henry F. Fordman
W'PONDS
2011
005.8 Rus/Csb : Computer security basics / Deborah Russell and G.T. Gangemi, Sr
Computer security basics / Deborah Russell and G.T. Gangemi, Sr
MELB
1991
005.8 Rya/Boc : Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov
Basics of contemporary cryptography for IT practitioners / Boris Ryabko and Andrey Fionov
W'PONDS
2005
005.8 Rya/Maa : The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
The modelling and analysis of security protocols : the CSP approach / P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
W'PONDS
2001
005.8 Sac/Dof : Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa
Design of fuzzy logic based SCADA system : practical implementation at industrial manufacturing unit / Gaurav Kumar Sachdevaa
W'PONDS
2011
005.8 Sal/Foc : Foundations of computer security / David Salomon
Foundations of computer security / David Salomon
MELB
2006
005.8 Sas/Sap : Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others]
Security and privacy in the age of Ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [and others]
W'PONDS
Incident response : computer forensics toolkit / Douglas Schweitzer
W'PONDS
2003
005.8 Sch/Lta : Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors
Long-term and dynamical aspects of information security : emerging trends in information and communication security / Andreas U. Schmidt, Michael Kreutzer and Rafael Accorsi, editors
W'PONDS
2007
005.8 Sch/Pcl : Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt
Patrolling cyberspace : lessons learned from a lifetime in data security / Howard A. Schmidt
W'PONDS
Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk
MELB, W'PONDS
1989
Cryptography : an introduction to computer security / Jennifer Seberry and Josef Pieprzyk
MELB, W'PONDS
1989
005.8 Sec/Com 2014 v.2 : International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers
International conference on security and privacy in communication networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers
MELB
2015
005.8 Sec/Com 2015 : Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran (editors)
Security and privacy in communication networks : 11th International Conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015, revised selected papers / Bhavani Thuraisingham, XiaoFeng Wang, Vin
W'PONDS
2015
005.8 Sen/Ima : Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.)
Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.)
MELB
2010
005.8 Ser/Nar : Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi
Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi
W'PONDS
2006
005.8 Ser/Qca : Quantum communications and cryptography / edited by Alexander V. Sergienko
Quantum communications and cryptography / edited by Alexander V. Sergienko
W'PONDS