005.8 Ser/Qca : Quantum communications and cryptography / edited by Alexander V. Sergienko
Quantum communications and cryptography / edited by Alexander V. Sergienko
W'PONDS
2006
005.8 She/Pfs : Protocols for secure electronic commerce / Mostafa Hashem Sherif
Protocols for secure electronic commerce / Mostafa Hashem Sherif
MELB
2000
005.8 Shi/Dwa : Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih
Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih
W'PONDS
2008
005.8 Shi/Sot
Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor
MELB, W'PONDS
2002
Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technical editor
MELB, W'PONDS
2002
005.8 Sho/Rmo : Risk management : objectives, policies & procedures / delivered by Blake Shorthouse
Risk management : objectives, policies & procedures / delivered by Blake Shorthouse
W'PONDS
1984?
005.8 Shy/Imd : Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds)
Intelligent multimedia data hiding : new directions / Jeng-Shyang Pan ... [and others], (eds)
MELB
2007
005.8 Sim/Hoe 2011
Hands on ethical hacking and network defense / by Michael T. Simpson
MELB, W'PONDS
2011
Hands on ethical hacking and network defense / by Michael T. Simpson
MELB, W'PONDS
2011
Hands on ethical hacking and network defense / by Michael T. Simpson
MELB, W'PONDS
2011
Hands on ethical hacking and network defense / by Michael T. Simpson
MELB, W'PONDS
2011
2 additional entries
005.8 Sim/Hoe 2017 : Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas D. Antill.
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas D. Antill.
MELB
2017
005.8 Skl/Hkt : Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov
Hidden keys to software break-ins and unauthorized entry / Dmitry Sklyarov
W'PONDS
2004
005.8 Skl/Wsa
Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang
MELB, W'PONDS
2007
Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang
MELB, W'PONDS
2007
005.8 Sko/Cha
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis
MELB, W'PONDS
2002
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis
MELB, W'PONDS
2002
005.8 Sko/Mfm : Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser
Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser
W'PONDS
2004
005.8 Sla/Its
Information technology security and risk management / Jill Slay, Andy Koronios
MELB, W'BOOL, W'PONDS
2006
Information technology security and risk management / Jill Slay, Andy Koronios
MELB, W'BOOL, W'PONDS
2006
Information technology security and risk management / Jill Slay, Andy Koronios
MELB, W'BOOL, W'PONDS
2006
005.8 Sla/Rsg 1996 : Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help
Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help
W'PONDS
1996
005.8 Smi/Cos
The craft of system security / Sean Smith, John Marchesini
MELB, W'PONDS
2008
The craft of system security / Sean Smith, John Marchesini
MELB, W'PONDS
2008
The craft of system security / Sean Smith, John Marchesini
MELB, W'PONDS
2008
The craft of system security / Sean Smith, John Marchesini
MELB, W'PONDS
2008
2 additional entries
005.8 Smi/Tcc : Trusted computing platforms : design and applications / Sean W. Smith
Trusted computing platforms : design and applications / Sean W. Smith
W'PONDS
2005
005.8 Sql And/Sss
SQL server security / Chip Andrews, David Litchfield, Bill Grindlay
MELB, W'PONDS
2003
SQL server security / Chip Andrews, David Litchfield, Bill Grindlay
MELB, W'PONDS
2003
005.8 Sql Lew/Sss : SQL server security distilled / Morris Lewis
SQL server security distilled / Morris Lewis
W'PONDS
2004
005.8 Sta/Can 1999 : Cryptography and network security : principles and practice / William Stallings
Cryptography and network security : principles and practice / William Stallings
W'PONDS
1999
005.8 Sta/Can 2003 : Cryptography and network security : principles and practice / William Stallings
Cryptography and network security : principles and practice / William Stallings
MELB
2003
005.8 Sta/Can 2006
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2006
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2006
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2006
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2006
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2006
005.8 Sta/Hoi
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors
MELB, W'PONDS
2010
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors
MELB, W'PONDS
2010
005.8 Sta/Hpl : Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane
Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane
W'PONDS
2001
005.8 Sta/Isp : Information security : principles and practice / Mark Stamp
Information security : principles and practice / Mark Stamp
MELB
2006
005.8 Sta/Nai : Network and internetwork security : principles and practice / William Stallings
Network and internetwork security : principles and practice / William Stallings
W'PONDS
1995
005.8 Sta/Nse : Network security essentials : applications and standards / William Stallings
Network security essentials : applications and standards / William Stallings
W'PONDS
2000
005.8 Sta/Nse 2007 : Network security essentials : applications and standards / William Stallings
Network security essentials : applications and standards / William Stallings
MELB
2007
005.8 Sta/Nse 2011
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2011
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2011
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2011
005.8 Sta/Nse 2014
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2013
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2013
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2013
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2013
005.8 Sta/Nse 2014 Intern.
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2014
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2014
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2014
Network security essentials : applications and standards / William Stallings
MELB, W'PONDS
2014
2 additional entries
005.8 Sta/Nse 2017
Network security essentials : applications and standards / William Stallings
MELB
2017
Network security essentials : applications and standards / William Stallings
MELB
2017
Network security essentials : applications and standards / William Stallings
MELB
2017
Network security essentials : applications and standards / William Stallings
MELB
2017
2 additional entries
005.8 Sta/Sfu
Security for ubiquitous computing / Frank Stajano
MELB, W'PONDS
2002
Security for ubiquitous computing / Frank Stajano
MELB, W'PONDS
2002
Security for ubiquitous computing / Frank Stajano
MELB, W'PONDS
2002
Security for ubiquitous computing / Frank Stajano
MELB, W'PONDS
2002
Security for ubiquitous computing / Frank Stajano
MELB, W'PONDS
2002
005.8 Ste/Csp : Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai
Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai
W'PONDS
2006
005.8 Ste/Cts
CompTIA security+ : review guide / James M. Stewart
MELB, W'PONDS
2011
CompTIA security+ : review guide / James M. Stewart
MELB, W'PONDS
2011
005.8 Ste/Nsf 2014 : Network security, firewalls, and VPNs / J. Michael Stewart
Network security, firewalls, and VPNs / J. Michael Stewart
W'PONDS
2014
005.8 Ste/Wsa : Web security : a step-by-step reference guide / Lincoln D. Stein
Web security : a step-by-step reference guide / Lincoln D. Stein
MELB
1998
005.8 Sto/Iaa : Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others]
Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others]
MELB
2008
005.8 Str/Ftc : Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie
Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie
W'PONDS
2002
005.8 Str/Htf : Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker
Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker
WATERFT
2012
005.8 Str/Isp : Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors
Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors
MELB
2008
005.8 Sub/Csp : Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor]
Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor]
MELB
2008
005.8 Swi/Tmo
Threat modeling / Frank Swiderski and Window Snyder
MELB, W'PONDS
2004
Threat modeling / Frank Swiderski and Window Snyder
MELB, W'PONDS
2004
005.8 Sym/Pot 2001 : Proceedings of the...Symposium on Security and Privacy
Proceedings of the...Symposium on Security and Privacy
MELB
005.8 Szo/Aoc
The art of computer virus research and defense / Peter Szor
MELB, W'PONDS
2005
The art of computer virus research and defense / Peter Szor
MELB, W'PONDS
2005
005.8 Tat/Ffa : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate
A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate
MELB THESES
2009
005.8 Tce/Iis 2004 : Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by Yves Deswarte ... [and others]
Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by
W'PONDS
2004
005.8 Tho/Nsf
Network security first-step / Tom Thomas
MELB, W'PONDS
2004
Network security first-step / Tom Thomas
MELB, W'PONDS
2004
005.8 Thu/Daa : Database and applications security : integrating information security and data management / Bhavani Thuraisingham
Database and applications security : integrating information security and data management / Bhavani Thuraisingham
W'PONDS
2005
005.8 Tib/Fav
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes
MELB, W'PONDS
2006
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes
MELB, W'PONDS
2006
005.8 Til/Foc : Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
MELB
2000
Add Marked to Bag
Add All On Page
Add Marked to My Lists