Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Wan/Cns : Computer network security : theory and practice / Jie Wang     
      Computer network security : theory and practice / Jie Wang MELB  Book 2009
005.8 Wan/Cop : Component-oriented programming / Andy Ju An Wang & Kai Qian     
      Component-oriented programming / Andy Ju An Wang & Kai Qian W'PONDS  Book 2005
005.8 Wan/Isr    
      Information security research : new methods for protecting against cyber threats / Department of Defense ; editors, Cliff Wang ... [and others] MELB, W'PONDS   Book 2007
      Information security research : new methods for protecting against cyber threats / Department of Defense ; editors, Cliff Wang ... [and others] MELB, W'PONDS   Book 2007
005.8 Wan/Stc    
      Steal this computer book 4.0 : what they won't tell you about the Internet / Wallace Wang MELB, W'PONDS   Book 2006
      Steal this computer book 4.0 : what they won't tell you about the Internet / Wallace Wang MELB, W'PONDS   Book 2006
005.8 War/Eha    
      A European healthcare approach to computer security risk analysis / M.J. Warren MELB, WATERFT ADPML   Book 1999
      A European healthcare approach to computer security risk analysis / M.J. Warren MELB, WATERFT ADPML   Book 1999
005.8 War/Eis : Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford Vaughn     
      Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford Vaughn W'PONDS  Book 2006
005.8 War/Pss : A practical soft system management approach to implementing security / M. Warren     
      A practical soft system management approach to implementing security / M. Warren WATERFT ADPML  Book 1999
005.8 War/Wcb : What can BS7799 teach Australia and New Zealand? / Matthew Warren     
      What can BS7799 teach Australia and New Zealand? / Matthew Warren WATERFT ADPML  Book 1998
005.8 Way/Dcp : Digital copyright protection / Peter Wayner     
      Digital copyright protection / Peter Wayner W'PONDS  Book 1997
005.8 Wea/Gtn 2007 : Guide to network defense and countermeasures / by Randy Weaver     
      Guide to network defense and countermeasures / by Randy Weaver MELB  Book 2007
005.8 Wei/Cig : The complete idiot's guide to protecting yourself on the Internet / by Aaron Weiss     
      The complete idiot's guide to protecting yourself on the Internet / by Aaron Weiss W'PONDS  Book 1995
005.8 Wei/Sie : Security in e-learning / by Edgar R. Weippl     
      Security in e-learning / by Edgar R. Weippl W'PONDS  Book 2005
005.8 Whi/ Poi 2009 : Principles of information security / Michael E. Whitman, Herbert J. Mattord     
      Principles of information security / Michael E. Whitman, Herbert J. Mattord W'BOOL, W'PONDS   Book 2009
005.8 Whi/Csa : Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch     
      Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch W'PONDS  Book 1996
005.8 Whi/Gtf 2012    
      Guide to firewalls AND VPNs / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2012
      Guide to firewalls AND VPNs / Michael E. Whitman, Herbert J. Mattord, Andrew Green MELB, W'PONDS   Book 2012
005.8 Whi/Gtn    
      Guide to network security / Michael Whitman ... [et.al.] MELB, W'PONDS   Book c2013
      Guide to network security / Michael Whitman ... [et.al.] MELB, W'PONDS   Book c2013
005.8 Whi/Htb    
      How to break software security : effective techniques for security testing / James A. Whittaker, Herbert H. Thompson MELB, W'PONDS   Book 2004
      How to break software security : effective techniques for security testing / James A. Whittaker, Herbert H. Thompson MELB, W'PONDS   Book 2004
005.8 Whi/Moi 2008    
      Management of information security / Michael E. Whitman, Herbert J. Mattord W'PONDS  Book 2008
      Management of information security / Michael E. Whitman, Herbert J. Mattord W'PONDS  Book 2008
      Management of information security / Michael E. Whitman, Herbert J. Mattord W'PONDS  Book 2008
      Management of information security / Michael E. Whitman, Herbert J. Mattord W'PONDS  Book 2008
005.8 Whi/Moi 2010    
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'BOOL, W'PONDS, WATERFT   Book 2010
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'BOOL, W'PONDS, WATERFT   Book 2010
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'BOOL, W'PONDS, WATERFT   Book 2010
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'BOOL, W'PONDS, WATERFT   Book 2010
005.8 Whi/Moi 2014    
      Management of information security / Michael E. Whitman, Ph.D., SISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University MELB, W'PONDS   Book 2014
      Management of information security / Michael E. Whitman, Ph.D., SISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University MELB, W'PONDS   Book 2014
      Management of information security / Michael E. Whitman, Ph.D., SISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University MELB, W'PONDS   Book 2014
      Management of information security / Michael E. Whitman, Ph.D., SISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University MELB, W'PONDS   Book 2014
005.8 Whi/Moi 2017    
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'PONDS   Book 2017
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'PONDS   Book 2017
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'PONDS   Book 2017
      Management of information security / Michael Whitman, Herbert Mattord MELB, W'PONDS   Book 2017
3 additional entries    
005.8 Whi/Moi 2019    
      Management of information security / Michael Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2019
      Management of information security / Michael Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2019
      Management of information security / Michael Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2019
      Management of information security / Michael Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2019
7 additional entries    
005.8 Whi/Poi : Principles of information security / Michael E. Whitman, Herbert J. Mattord     
      Principles of information security / Michael E. Whitman, Herbert J. Mattord W'BOOL, W'PONDS   Book 2009
005.8 Whi/Poi 2005 : Principles of information security / Michael E. Whitman, Herbert J. Mattord     
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB  Book 2005
005.8 Whi/Poi 2012    
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS, WATERFT   Book 2011
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS, WATERFT   Book 2011
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS, WATERFT   Book 2011
005.8 Whi/Poi 2016    
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB  Book 2015
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB  Book 2015
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB  Book 2015
      Principles of information security / Michael E. Whitman, Herbert J. Mattord MELB  Book 2015
005.8 Whi/Poi 2022    
      Principles of information security / Michael E. Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2022
      Principles of information security / Michael E. Whitman, Herbert J. Mattord GIFT CITY, MELB, W'PONDS   Book 2022
005.8 Whi/Rti    
      Roadmap to information security : for IT and InfoSec managers / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS   Book 2011
      Roadmap to information security : for IT and InfoSec managers / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS   Book 2011
      Roadmap to information security : for IT and InfoSec managers / Michael E. Whitman, Herbert J. Mattord MELB, W'PONDS   Book 2011
005.8 Wil/Iaa : Information assurance architecture / Keith D. WIllett     
      Information assurance architecture / Keith D. WIllett W'PONDS  Book 2008
005.8 Window Smi/Mws : Microsoft Windows security resource kit / Ben Smith and Brian Komar, with the microsoft security team     
      Microsoft Windows security resource kit / Ben Smith and Brian Komar, with the microsoft security team W'PONDS  Book 2003
005.8 Won/Nis : Network infrastructure security / by Angus Wong, Alan Yeung     
      Network infrastructure security / by Angus Wong, Alan Yeung MELB  Book 2009
005.8 Won/Ppd    
      Privacy-preserving data publishing : an overview / Raymond Chi-Wing Wong, Ada Wai-Chee Fu MELB, W'PONDS   Book 2010
      Privacy-preserving data publishing : an overview / Raymond Chi-Wing Wong, Ada Wai-Chee Fu MELB, W'PONDS   Book 2010
005.8 Wri/Isc    
      Information security : contemporary cases / Marie A. Wright, John S. Kakalik MELB, W'PONDS   Book 2006
      Information security : contemporary cases / Marie A. Wright, John S. Kakalik MELB, W'PONDS   Book 2006
005.8 Wua/Itc    
      Introduction to computer networks and cybersecurity / Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University MELB, W'PONDS, WATERFT   Book 2013
      Introduction to computer networks and cybersecurity / Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University MELB, W'PONDS, WATERFT   Book 2013
      Introduction to computer networks and cybersecurity / Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University MELB, W'PONDS, WATERFT   Book 2013
      Introduction to computer networks and cybersecurity / Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University MELB, W'PONDS, WATERFT   Book 2013
      Introduction to computer networks and cybersecurity / Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University MELB, W'PONDS, WATERFT   Book 2013
005.8 Wys/Aos : The art of software security testing : identifying software security flaws / Chris Wysopal ... [and others]     
      The art of software security testing : identifying software security flaws / Chris Wysopal ... [and others] MELB  Book 2006
005.8 Xia/Hos    
      Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen MELB, W'PONDS   Book 2011
      Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen MELB, W'PONDS   Book 2011
005.8 Xia/Sar : Security and routing in wireless networks / Yang Xiao, Jie Li, and Yi Pan, editors     
      Security and routing in wireless networks / Yang Xiao, Jie Li, and Yi Pan, editors W'PONDS  Book 2005
005.8 Xia/Sid : Security in distributed, grid, mobile, and pervasive computing / Yang Xiao     
      Security in distributed, grid, mobile, and pervasive computing / Yang Xiao MELB  Book 2007
005.8 Yam/Tam : Trust modeling and management in digital environments : from social concept to system development / [edited by] Zheng Yan     
      Trust modeling and management in digital environments : from social concept to system development / [edited by] Zheng Yan W'PONDS  Book 2010
005.8 Yee/Ppf : Privacy protection for e-services / George Yee, editor     
      Privacy protection for e-services / George Yee, editor MELB  Book 2006
005.8 Yix/Pir : Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino     
      Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino MELB  Book 2013
005.8 Yua/Ida : Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai     
      Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai MELB  Book 2011
005.8 Yua/Sdm    
      Secure data management in decentalized systems / edited by Ting Yu, Sushil Jajodia MELB, W'PONDS   Book 2007
      Secure data management in decentalized systems / edited by Ting Yu, Sushil Jajodia MELB, W'PONDS   Book 2007
005.8 Zal/Sot : Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski     
      Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski W'PONDS  Book 2005
005.8 Zel/Aic : Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz     
      Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz W'PONDS  Book 2004
005.8 Zen/Mst : Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin     
      Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin W'PONDS  Book 2006
005.8 Zha/Siw : Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu     
      Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu MELB  Book 2009
005.8 Zou/Sgc : Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras     
      Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras W'PONDS  Book 2005
005.8 Zou/Tas : Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan     
      Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan MELB  Book 2008
005.80151 Dwo/Afo : The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth     
      The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth MELB  Book 2014
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next