Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Sen/Ima    
      Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.) BONUS, MELB   Book 2010
      Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.) BONUS, MELB   Book 2010
005.8 Ser/Nar : Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi     
      Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi BONUS, W'PONDS   Book 2006
005.8 Ser/Qca : Quantum communications and cryptography / edited by Alexander V. Sergienko     
      Quantum communications and cryptography / edited by Alexander V. Sergienko BONUS, W'PONDS   Book 2006
005.8 She/Pfs : Protocols for secure electronic commerce / Mostafa Hashem Sherif     
      Protocols for secure electronic commerce / Mostafa Hashem Sherif BONUS, MELB   Book 2000
005.8 Shi/Dwa : Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih     
      Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih BONUS, W'PONDS   Book 2008
005.8 Shi/Sot    
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor BONUS, MELB, W'PONDS   Book 2002
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor BONUS, MELB, W'PONDS   Book 2002
005.8 Sho/Rmo : Risk management : objectives, policies & procedures / delivered by Blake Shorthouse     
      Risk management : objectives, policies & procedures / delivered by Blake Shorthouse BONUS, W'PONDS   Book 1984?
005.8 Shy/Imd : Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds)     
      Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds) BONUS, MELB   Book 2007
005.8 Sim/Hoe : Hands on ethical hacking and network defense / by Michael T. Simpson     
      Hands on ethical hacking and network defense / by Michael T. Simpson BONUS, W'PONDS   Book 2006
005.8 Sim/Hoe 2011    
      Hands on ethical hacking and network defense / by Michael T. Simpson BONUS, MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson BONUS, MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson BONUS, MELB, W'PONDS   Book 2011
      Hands on ethical hacking and network defense / by Michael T. Simpson BONUS, MELB, W'PONDS   Book 2011
2 additional entries    
005.8 Skl/Hkt : Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov     
      Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov BONUS, W'PONDS   Book 2004
005.8 Skl/Wsa    
      Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang BONUS, MELB, W'PONDS   Book 2007
      Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang BONUS, MELB, W'PONDS   Book 2007
005.8 Sko/Cha    
      Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis BONUS, MELB, W'PONDS   Book 2002
      Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis BONUS, MELB, W'PONDS   Book 2002
005.8 Sko/Mfm : Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser     
      Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser BONUS, W'PONDS   Book 2004
005.8 Sla/Its    
      Information technology security and risk management / Jill Slay, Andy Koronios BONUS, MELB, W'BOOL, W'PONDS   Book 2006
      Information technology security and risk management / Jill Slay, Andy Koronios BONUS, MELB, W'BOOL, W'PONDS   Book 2006
      Information technology security and risk management / Jill Slay, Andy Koronios BONUS, MELB, W'BOOL, W'PONDS   Book 2006
005.8 Sla/Rsg 1996 : Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help     
      Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help BONUS, W'PONDS   Book 1996
005.8 Smi/Cos    
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
      The craft of system security / Sean Smith, John Marchesini MELB, W'PONDS   Book 2008
2 additional entries    
005.8 Smi/Tcc : Trusted computing platforms : design and applications / Sean W. Smith     
      Trusted computing platforms : design and applications / Sean W. Smith BONUS, W'PONDS   Book 2005
005.8 Sql And/Sss    
      SQL server security / Chip Andrews, David Litchfield, Bill Grindlay BONUS, MELB, W'PONDS   Book 2003
      SQL server security / Chip Andrews, David Litchfield, Bill Grindlay BONUS, MELB, W'PONDS   Book 2003
005.8 Sql Lew/Sss : SQL server security distilled / Morris Lewis     
      SQL server security distilled / Morris Lewis BONUS, W'PONDS   Book 2004
005.8 Sta/Can 1999 : Cryptography and network security : principles and practice / William Stallings     
      Cryptography and network security : principles and practice / William Stallings BONUS, W'PONDS   Book 1999
005.8 Sta/Can 2003 : Cryptography and network security : principles and practice / William Stallings     
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB   Book 2003
005.8 Sta/Can 2006    
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB, W'PONDS   Book 2006
      Cryptography and network security : principles and practice / William Stallings BONUS, MELB, W'PONDS   Book 2006
005.8 Sta/Hoi    
      Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors BONUS, MELB, W'PONDS   Book 2010
      Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors BONUS, MELB, W'PONDS   Book 2010
005.8 Sta/Hpl : Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane     
      Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane BONUS, W'PONDS   Book 2001
005.8 Sta/Isp : Information security : principles and practice / Mark Stamp     
      Information security : principles and practice / Mark Stamp BONUS, MELB   Book 2006
005.8 Sta/Nai : Network and internetwork security : principles and practice / William Stallings     
      Network and internetwork security : principles and practice / William Stallings BONUS, W'PONDS   Book 1995
005.8 Sta/Nse : Network security essentials : applications and standards / William Stallings     
      Network security essentials : applications and standards / William Stallings BONUS, W'PONDS   Book 2000
005.8 Sta/Nse 2007 : Network security essentials : applications and standards / William Stallings     
      Network security essentials : applications and standards / William Stallings BONUS, MELB   Book 2007
005.8 Sta/Nse 2011    
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2011
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2011
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2011
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2011
2 additional entries    
005.8 Sta/Nse 2014    
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings BONUS, MELB, W'PONDS   Book 2013
3 additional entries    
005.8 Sta/Nse 2014 Intern.    
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
2 additional entries    
005.8 Sta/Nse 2017    
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
2 additional entries    
005.8 Sta/Sfu    
      Security for ubiquitous computing / Frank Stajano BONUS, MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano BONUS, MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano BONUS, MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano BONUS, MELB, W'PONDS   Book 2002
2 additional entries    
005.8 Ste/Csp : Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai     
      Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai BONUS, W'PONDS   Book 2006
005.8 Ste/Cts    
      CompTIA security+ : review guide / James M. Stewart BONUS, MELB, W'PONDS   Book 2011
      CompTIA security+ : review guide / James M. Stewart BONUS, MELB, W'PONDS   Book 2011
005.8 Ste/Nsf 2014 : Network security, firewalls, and VPNs / J. Michael Stewart     
      Network security, firewalls, and VPNs / J. Michael Stewart W'PONDS  Book 2014
005.8 Ste/Wsa : Web security : a step-by-step reference guide / Lincoln D. Stein     
      Web security : a step-by-step reference guide / Lincoln D. Stein BONUS, MELB   Book 1998
005.8 Sto/Iaa : Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others]     
      Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others] BONUS, MELB   Book 2008
005.8 Str/Ftc : Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie     
      Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie BONUS, W'PONDS   Book 2002
005.8 Str/Htf : Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker     
      Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker BONUS, WATERFT   Book 2012
005.8 Str/Isp : Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors     
      Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors BONUS, MELB   Book 2008
005.8 Sub/Csp : Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor]     
      Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor] BONUS, MELB   Book 2008
005.8 Swi/Tmo    
      Threat modeling / Frank Swiderski and Window Snyder BONUS, MELB, W'PONDS   Book 2004
      Threat modeling / Frank Swiderski and Window Snyder BONUS, MELB, W'PONDS   Book 2004
005.8 Sym/Pot 2001 : Proceedings of the...Symposium on Security and Privacy     
      Proceedings of the...Symposium on Security and Privacy BONUS, MELB   Book  
005.8 Szo/Aoc    
      The art of computer virus research and defense / Peter Szor BONUS, MELB, W'PONDS   Book 2005
      The art of computer virus research and defense / Peter Szor BONUS, MELB, W'PONDS   Book 2005
005.8 Tat/Ffa : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate     
      A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate MELB THESES  Book 2009
005.8 Tce/Iis 2004 : Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by Yves Deswarte ... [and others]     
      Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by BONUS, W'PONDS   Book 2004
005.8 Tho/Nsf    
      Network security first-step / Tom Thomas BONUS, MELB, W'PONDS   Book 2004
      Network security first-step / Tom Thomas BONUS, MELB, W'PONDS   Book 2004
005.8 Thu/Daa : Database and applications security : integrating information security and data management / Bhavani Thuraisingham     
      Database and applications security : integrating information security and data management / Bhavani Thuraisingham BONUS, W'PONDS   Book 2005
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next