005.8 Zal/Sot : Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski
2005
1
005.8 Zel/Aic : Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz
2004
1
005.8 Zen/Mst : Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin
2006
1
005.8 Zha/Siw : Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu
2009
1
005.8 Zou/Sgc : Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
2005
1
005.8 Zou/Tas : Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan
2008
1
005.80151 Dwo/Afo : The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth
2014
1
005.80218 Gol/Qop : Quality of protection : security measurements and metrics / edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
2006
1
005.80218 Hum/Iti : Implementing the ISO/IEC 27001 information security management system standard / Edward Humphreys
2007
1
005.80218 Int/Its : Information technology : security techniques : information security management : measurement = Technologies de l'information : techniques de sécurité : management de la sécurité de l'information : mesurage
2009
1
005.80218 Int/Its 2012 : Information technology : security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = Technologies de l'information : techniques de sécurité : lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuvres numériques
2012
1
005.8021841 Bri/Its : Information technology -- security techniques -- selection, deployment and operations of intrusion detection systems
005.80994 Lop/Ooa : An overview of Australian hacking (2001) / M. Lopez-Fernandez and M.J. Warren
2002
1
005.82 Acn/Aca 2004 : Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)
2004
1
005.82 Acn/Aca 2005 : Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings / John Ionnidis, Angelos Keromytis, Moti Yung (eds)
005.82 Aus/Aic 1990 : Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds
005.82 Cre/Pct : Probabilistic cipher : theoretical analysis through practical implementation and comparison against RSA & ECC / Orhio Mark Creado
20--
1
005.82 Cry/Aic 2004 : Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings / Matt Franklin (ed.)
2004
1
005.82 Crypto Bon/Cfv : Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI / Richard Bondi
2000
1
005.82 Cta/Rsa 2006 : Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings / David Pointcheval (Ed.)
2006
1
005.82 Cur/Bfc : Brute force : cracking the data encryption standard / Matt Curtin