Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
005.8 Yee/Ppf : Privacy protection for e-services / George Yee, editor  2006 1
005.8 Yix/Pir : Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino  2013 1
005.8 Yua/Ida : Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai  2011 1
005.8 Yua/Sdm   2
005.8 Zal/Sot : Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski  2005 1
005.8 Zel/Aic : Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz  2004 1
005.8 Zen/Mst : Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin  2006 1
005.8 Zha/Siw : Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu  2009 1
005.8 Zou/Sgc : Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras  2005 1
005.8 Zou/Tas : Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan  2008 1
005.80151 Dwo/Afo : The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth  2014 1
005.80218 Gol/Qop : Quality of protection : security measurements and metrics / edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin  2006 1
005.80218 Hum/Iti : Implementing the ISO/IEC 27001 information security management system standard / Edward Humphreys  2007 1
005.80218 Int/Its : Information technology : security techniques : information security management : measurement = Technologies de l'information : techniques de sécurité : management de la sécurité de l'information : mesurage  2009 1
005.80218 Int/Its 2012 : Information technology : security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = Technologies de l'information : techniques de sécurité : lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuvres numériques  2012 1
005.8021841 Bri/Its : Information technology -- security techniques -- selection, deployment and operations of intrusion detection systems  2006 1
005.803 Gat/Isd   2
005.803 Pho/Isd : Internet security dictionary / Vir V. Phoha  2002 1
005.8068 Axe/Ois : Outsourcing information security / C. Warren Axelrod  2004 1
005.8068 Pro/Ira : Incident response & computer forensics / Chris Prosise, Kevin Mandia  2003 1
005.8068 Van/Ire : Incident response / Kenneth R. van Wyk and Richard Forno  2001 1
005.8071 Rya/Soc : A summary of computer security courses taught within Australia and New Zealand (2002) / Rebecca Ryan and Matthew Warren  2002 1
005.8076 Mes/Ceh : CEH v10 certified ethical hacker study guide / Ric Messier, CEH, GCIH, GSEC, CISSP  2019 1
005.8076 Wee/Mss   3
005.8092 Wei/Pta   3
005.80973 Sch/Sos : Schneier on security / Bruce Schneier  2008 1
005.80994 Lop/Ooa : An overview of Australian hacking (2001) / M. Lopez-Fernandez and M.J. Warren  2002 1
005.82 Acn/Aca 2004 : Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)  2004 1
005.82 Acn/Aca 2005 : Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings / John Ionnidis, Angelos Keromytis, Moti Yung (eds)  2005 1
005.82 Aco/Ccr 2004 : Contemporary cryptology / Dario Catalano ... [and others]  2005 1
005.82 Atr/Dsi : Digital signatures / Mohan Atreya ... [and others]  2002 1
005.82 Aus/Aic 1990 : Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds  1990 1
005.82 Bar/Acr   2
005.82 Bat/Pkc   3
005.82 Ber/Pqc : Post quantum cryptography / edited by Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen  2009 1
005.82 Bla/Aie : Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart  2005 1
005.82 Bla/Eci : Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart  1999 1
005.82 Boh/Ass   2
005.82 Bur/Rso : RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine  2001 1
005.82 C Wel/Cic 2001 : Cryptography in C and C++ / Michael Welschenbach ; translated by David Kramer  2001 1
005.82 Cam/Fse 1993 : Fast software encryption : Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedings / Ross Anderson, (ed.)  1994 1
005.82 Che/Poc : Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen  2004 1
005.82 Cho/Ske : Secure key establishment / by Kim-Kwang Raymond Choo  2009 1
005.82 Cid/Aao : Algebraic aspects of the advanced encryption standard / by Carlos Cid, Sean Murphy, Matthew Robshaw  2006 1
005.82 Col/Dca   2
005.82 Cre/Pct : Probabilistic cipher : theoretical analysis through practical implementation and comparison against RSA & ECC / Orhio Mark Creado  20-- 1
005.82 Cry/Aic 2004 : Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings / Matt Franklin (ed.)  2004 1
005.82 Crypto Bon/Cfv : Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI / Richard Bondi  2000 1
005.82 Cta/Rsa 2006 : Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings / David Pointcheval (Ed.)  2006 1
005.82 Cur/Bfc : Brute force : cracking the data encryption standard / Matt Curtin  2005 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next