Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Sta/Nai : Network and internetwork security : principles and practice / William Stallings     
      Network and internetwork security : principles and practice / William Stallings W'PONDS  Book 1995
005.8 Sta/Nse : Network security essentials : applications and standards / William Stallings     
      Network security essentials : applications and standards / William Stallings W'PONDS  Book 2000
005.8 Sta/Nse 2007 : Network security essentials : applications and standards / William Stallings     
      Network security essentials : applications and standards / William Stallings MELB  Book 2007
005.8 Sta/Nse 2011    
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2011
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2011
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2011
005.8 Sta/Nse 2014    
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2013
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2013
005.8 Sta/Nse 2014 Intern.    
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
      Network security essentials : applications and standards / William Stallings MELB, W'PONDS   Book 2014
2 additional entries    
005.8 Sta/Nse 2017    
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
      Network security essentials : applications and standards / William Stallings MELB  Book 2017
2 additional entries    
005.8 Sta/Sfu    
      Security for ubiquitous computing / Frank Stajano MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano MELB, W'PONDS   Book 2002
      Security for ubiquitous computing / Frank Stajano MELB, W'PONDS   Book 2002
005.8 Ste/Csp : Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai     
      Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai W'PONDS  Book 2006
005.8 Ste/Cts    
      CompTIA security+ : review guide / James M. Stewart MELB, W'PONDS   Book 2011
      CompTIA security+ : review guide / James M. Stewart MELB, W'PONDS   Book 2011
005.8 Ste/Nsf 2014 : Network security, firewalls, and VPNs / J. Michael Stewart     
      Network security, firewalls, and VPNs / J. Michael Stewart W'PONDS  Book 2014
005.8 Ste/Wsa : Web security : a step-by-step reference guide / Lincoln D. Stein     
      Web security : a step-by-step reference guide / Lincoln D. Stein MELB  Book 1998
005.8 Sto/Iaa : Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others]     
      Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo ... [and others] MELB  Book 2008
005.8 Str/Ftc : Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie     
      Firewalls : the complete reference / Ketuh Strassberg, Richard Gondek, Gary Rollie W'PONDS  Book 2002
005.8 Str/Htf : Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker     
      Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker WATERFT  Book 2012
005.8 Str/Isp : Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors     
      Information security : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors MELB  Book 2008
005.8 Sub/Csp : Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor]     
      Computer security, privacy, and politics : current issues, challenges, and solutions / Ramesh Subramanian [editor] MELB  Book 2008
005.8 Swi/Tmo    
      Threat modeling / Frank Swiderski and Window Snyder MELB, W'PONDS   Book 2004
      Threat modeling / Frank Swiderski and Window Snyder MELB, W'PONDS   Book 2004
005.8 Sym/Pot 2001 : Proceedings of the...Symposium on Security and Privacy     
      Proceedings of the...Symposium on Security and Privacy MELB  Book  
005.8 Szo/Aoc    
      The art of computer virus research and defense / Peter Szor MELB, W'PONDS   Book 2005
      The art of computer virus research and defense / Peter Szor MELB, W'PONDS   Book 2005
005.8 Tat/Ffa : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate     
      A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate MELB THESES  Book 2009
005.8 Tce/Iis 2004 : Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by Yves Deswarte ... [and others]     
      Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / Edited by W'PONDS  Book 2004
005.8 Tho/Nsf    
      Network security first-step / Tom Thomas MELB, W'PONDS   Book 2004
      Network security first-step / Tom Thomas MELB, W'PONDS   Book 2004
005.8 Thu/Daa : Database and applications security : integrating information security and data management / Bhavani Thuraisingham     
      Database and applications security : integrating information security and data management / Bhavani Thuraisingham W'PONDS  Book 2005
005.8 Tib/Fav    
      Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes MELB, W'PONDS   Book 2006
      Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes MELB, W'PONDS   Book 2006
005.8 Til/Foc : Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg     
      Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg MELB  Book 2000
005.8 Trc/Mis : Managing information systems security and privacy / Denis Trcek     
      Managing information systems security and privacy / Denis Trcek MELB  Book 2006
005.8 Tre/Pon : Privacy online / edited by Sabine Trepte, Leonard Reinecke     
      Privacy online / edited by Sabine Trepte, Leonard Reinecke W'PONDS  Book 2011
005.8 Tso/Drm : Digital rights management for e-commerce systems / Dimitrios Tsolis ... [and others]     
      Digital rights management for e-commerce systems / Dimitrios Tsolis ... [and others] MELB  Book 2009
005.8 Unix Bar/Sts : SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman     
      SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman MELB  Book 2001
005.8 Unix Cur/Uss : UNIX system security : a guide for users and system administrators / David A. Curry     
      UNIX system security : a guide for users and system administrators / David A. Curry W'PONDS  Book 1992
005.8 Unix Gar/Pua 2003 : Practical UNIX and Internet security     
      Practical UNIX and Internet security W'PONDS  Book 2003
005.8 Unix Gar/Pus : Practical UNIX security / Simson Garfinkel and Gene Spafford     
      Practical UNIX security / Simson Garfinkel and Gene Spafford W'PONDS  Book 1991
005.8 Unix Ros/Uss : UNIX system security tools / Seth T. Ross     
      UNIX system security tools / Seth T. Ross W'PONDS  Book 2000
005.8 Vac/Cfc 2005 : Computer forensics : computer crime scene investigation / John R. Vacca     
      Computer forensics : computer crime scene investigation / John R. Vacca MELB  Book 2005
005.8 Vac/Gtw : Guide to wireless network security / by John R. Vacca     
      Guide to wireless network security / by John R. Vacca W'PONDS  Book 2006
005.8 Vac/Mis : Managing information security / editor, John R. Vacca     
      Managing information security / editor, John R. Vacca MELB  Book 2010
005.8 Vac/Nas : Network and system security / editor, John R. Vacca     
      Network and system security / editor, John R. Vacca MELB  Book 2010
005.8 Vac/Pis    
      Practical Internet security / by John R. Vacca MELB, W'PONDS   Book 2007
      Practical Internet security / by John R. Vacca MELB, W'PONDS   Book 2007
005.8 Vau/Cit    
      A classical introduction to cryptography : applications for communications security / by Serge Vaudenay MELB, W'PONDS   Book 2006
      A classical introduction to cryptography : applications for communications security / by Serge Vaudenay MELB, W'PONDS   Book 2006
005.8 Vie/Bss : Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw     
      Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw W'PONDS  Book 2002
005.8 Vie/Mos : The myths of security : what the computer security industry doesn't want you to know / John Viega     
      The myths of security : what the computer security industry doesn't want you to know / John Viega W'PONDS  Book 2009
005.8 Vig/Maa : Mobile agents and security / Giovanni Vigna, ed     
      Mobile agents and security / Giovanni Vigna, ed W'PONDS  Book 1998
005.8 Vin/Wse : Wireless security essentials : defending mobile systems from data piracy / Russell Dean Vines     
      Wireless security essentials : defending mobile systems from data piracy / Russell Dean Vines W'BOOL  Book 2002
005.8 Vla/Wfo : Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky     
      Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky W'PONDS  Book 2004
005.8 Vol/Pap    
      Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino MELB, W'PONDS   Book 2004
      Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino MELB, W'PONDS   Book 2004
005.8 Wag/Con : Cryptanalysis of number theoretic ciphers / Samuel S. Wagstaff, Jr     
      Cryptanalysis of number theoretic ciphers / Samuel S. Wagstaff, Jr MELB  Book 2003
005.8 Wal/Epa    
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors MELB, WATERFT   Book 2007
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors MELB, WATERFT   Book 2007
005.8 Wan/Cns : Computer network security : theory and practice / Jie Wang     
      Computer network security : theory and practice / Jie Wang MELB  Book 2009
005.8 Wan/Cop : Component-oriented programming / Andy Ju An Wang & Kai Qian     
      Component-oriented programming / Andy Ju An Wang & Kai Qian W'PONDS  Book 2005
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next