Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Yee/Ppf : Privacy protection for e-services / George Yee, editor     
      Privacy protection for e-services / George Yee, editor MELB  Book 2006
005.8 Yix/Pir : Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino     
      Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino MELB  Book 2013
005.8 Yua/Ida : Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai     
      Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai MELB  Book 2011
005.8 Yua/Sdm    
      Secure data management in decentalized systems / edited by Ting Yu, Sushil Jajodia MELB, W'PONDS   Book 2007
      Secure data management in decentalized systems / edited by Ting Yu, Sushil Jajodia MELB, W'PONDS   Book 2007
005.8 Zal/Sot : Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski     
      Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski W'PONDS  Book 2005
005.8 Zel/Aic : Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz     
      Advances in computers. Vol. 60, Information security / edited by Marvin Zelkowitz W'PONDS  Book 2004
005.8 Zen/Mst : Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin     
      Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin W'PONDS  Book 2006
005.8 Zha/Siw : Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu     
      Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu MELB  Book 2009
005.8 Zou/Sgc : Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras     
      Secure group communications over data networks / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras W'PONDS  Book 2005
005.8 Zou/Tas : Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan     
      Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan MELB  Book 2008
005.80151 Dwo/Afo : The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth     
      The algorithmic foundations of differential privacy / Cynthia Dwork, Aaron Roth MELB  Book 2014
005.80218 Gol/Qop : Quality of protection : security measurements and metrics / edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin     
      Quality of protection : security measurements and metrics / edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin W'PONDS  Book 2006
005.80218 Hum/Iti : Implementing the ISO/IEC 27001 information security management system standard / Edward Humphreys     
      Implementing the ISO/IEC 27001 information security management system standard / Edward Humphreys MELB  Book 2007
005.80218 Int/Its : Information technology : security techniques : information security management : measurement = Technologies de l'information : techniques de sécurité : management de la sécurité de l'information : mesurage     
      Information technology : security techniques : information security management : measurement = Technologies de l'information : techniques de sécurité : management de la sécurité de l'information : mesu W'PONDS  Book 2009
005.80218 Int/Its 2012 : Information technology : security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = Technologies de l'information : techniques de sécurité : lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuvres numériques     
      Information technology : security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = Technologies de l'information : techniques de sécurité : l WATERFT  Book 2012
005.8021841 Bri/Its : Information technology -- security techniques -- selection, deployment and operations of intrusion detection systems     
      Information technology -- security techniques -- selection, deployment and operations of intrusion detection systems W'PONDS  Book 2006
005.803 Gat/Isd    
      The information security dictionary : defining the terms that define security for e-business, Internet, information and wireless technology / Urs E. Gattiker MELB, W'PONDS   Book 2004
      The information security dictionary : defining the terms that define security for e-business, Internet, information and wireless technology / Urs E. Gattiker MELB, W'PONDS   Book 2004
005.803 Pho/Isd : Internet security dictionary / Vir V. Phoha     
      Internet security dictionary / Vir V. Phoha MELB  CD-ROM 2002
005.8068 Axe/Ois : Outsourcing information security / C. Warren Axelrod     
      Outsourcing information security / C. Warren Axelrod MELB  Book 2004
005.8068 Pro/Ira : Incident response & computer forensics / Chris Prosise, Kevin Mandia     
      Incident response & computer forensics / Chris Prosise, Kevin Mandia MELB  Book 2003
005.8068 Van/Ire : Incident response / Kenneth R. van Wyk and Richard Forno     
      Incident response / Kenneth R. van Wyk and Richard Forno MELB  Book 2001
005.8071 Rya/Soc : A summary of computer security courses taught within Australia and New Zealand (2002) / Rebecca Ryan and Matthew Warren     
      A summary of computer security courses taught within Australia and New Zealand (2002) / Rebecca Ryan and Matthew Warren WATERFT ADPML  Book 2002
005.8076 Mes/Ceh : CEH v10 certified ethical hacker study guide / Ric Messier, CEH, GCIH, GSEC, CISSP     
      CEH v10 certified ethical hacker study guide / Ric Messier, CEH, GCIH, GSEC, CISSP MELB  Book 2019
005.8076 Wee/Mss    
      Mobile services security : parameter based identification, authentication and authorization method for mobile services / Dasun Weerasinghe MELB, W'PONDS   Book 2010
      Mobile services security : parameter based identification, authentication and authorization method for mobile services / Dasun Weerasinghe MELB, W'PONDS   Book 2010
      Mobile services security : parameter based identification, authentication and authorization method for mobile services / Dasun Weerasinghe MELB, W'PONDS   Book 2010
005.8092 Wei/Pta    
      Penetration testing : a hands-on introduction to hacking / by Georgia Weidman MELB, W'PONDS   Book 2014
      Penetration testing : a hands-on introduction to hacking / by Georgia Weidman MELB, W'PONDS   Book 2014
      Penetration testing : a hands-on introduction to hacking / by Georgia Weidman MELB, W'PONDS   Book 2014
005.80973 Sch/Sos : Schneier on security / Bruce Schneier     
      Schneier on security / Bruce Schneier MELB  Book 2008
005.80994 Lop/Ooa : An overview of Australian hacking (2001) / M. Lopez-Fernandez and M.J. Warren     
      An overview of Australian hacking (2001) / M. Lopez-Fernandez and M.J. Warren WATERFT ADPML  Book 2002
005.82 Acn/Aca 2004 : Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)     
      Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / Markus Jakobsson, Moti Yung, Jianying Zhou (eds.) W'PONDS  Book 2004
005.82 Acn/Aca 2005 : Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings / John Ionnidis, Angelos Keromytis, Moti Yung (eds)     
      Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings / John Ionnidis, Angelos Keromytis, Moti Yung (eds) W'PONDS  Book 2005
005.82 Aco/Ccr 2004 : Contemporary cryptology / Dario Catalano ... [and others]     
      Contemporary cryptology / Dario Catalano ... [and others] W'PONDS  Book 2005
005.82 Atr/Dsi : Digital signatures / Mohan Atreya ... [and others]     
      Digital signatures / Mohan Atreya ... [and others] MELB  Book 2002
005.82 Aus/Aic 1990 : Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds     
      Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / J. Seberry, J. Pieprzyk, eds W'PONDS  Book 1990
005.82 Bar/Acr    
      Algebraic cryptanalysis / Gregory V. Bard MELB, W'PONDS   Book 2009
      Algebraic cryptanalysis / Gregory V. Bard MELB, W'PONDS   Book 2009
005.82 Bat/Pkc    
      Public key cryptography : applications and attacks / Lynn Margaret Batten MELB  Book 2012
      Public key cryptography : applications and attacks / Lynn Margaret Batten MELB  Book 2012
      Public key cryptography : applications and attacks / Lynn Margaret Batten MELB  Book 2012
005.82 Ber/Pqc : Post quantum cryptography / edited by Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen     
      Post quantum cryptography / edited by Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen MELB  Book 2009
005.82 Bla/Aie : Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart     
      Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart MELB  Book 2005
005.82 Bla/Eci : Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart     
      Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart MELB  Book 1999
005.82 Boh/Ass    
      Advanced statistical steganalysis / Rainer Böhme MELB, W'PONDS   Book 2010
      Advanced statistical steganalysis / Rainer Böhme MELB, W'PONDS   Book 2010
005.82 Bur/Rso : RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine     
      RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine MELB  Book 2001
005.82 C Wel/Cic 2001 : Cryptography in C and C++ / Michael Welschenbach ; translated by David Kramer     
      Cryptography in C and C++ / Michael Welschenbach ; translated by David Kramer W'PONDS  Book 2001
005.82 Cam/Fse 1993 : Fast software encryption : Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedings / Ross Anderson, (ed.)     
      Fast software encryption : Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedings / Ross Anderson, (ed.) W'PONDS  Book 1994
005.82 Che/Poc : Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen     
      Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen W'PONDS  Book 2004
005.82 Cho/Ske : Secure key establishment / by Kim-Kwang Raymond Choo     
      Secure key establishment / by Kim-Kwang Raymond Choo W'PONDS  Book 2009
005.82 Cid/Aao : Algebraic aspects of the advanced encryption standard / by Carlos Cid, Sean Murphy, Matthew Robshaw     
      Algebraic aspects of the advanced encryption standard / by Carlos Cid, Sean Murphy, Matthew Robshaw W'PONDS  Book 2006
005.82 Col/Dca    
      Disposable ciphers : a method of specifying ciphers in real time using bit strings / Bernard Colbert MELB, WATERFT ADPML   Book 2008
      Disposable ciphers : a method of specifying ciphers in real time using bit strings / Bernard Colbert MELB, WATERFT ADPML   Book 2008
005.82 Cre/Pct : Probabilistic cipher : theoretical analysis through practical implementation and comparison against RSA & ECC / Orhio Mark Creado     
      Probabilistic cipher : theoretical analysis through practical implementation and comparison against RSA & ECC / Orhio Mark Creado MELB  CD-ROM 20--
005.82 Cry/Aic 2004 : Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings / Matt Franklin (ed.)     
      Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings / Matt Franklin (ed.) W'PONDS  Book 2004
005.82 Crypto Bon/Cfv : Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI / Richard Bondi     
      Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI / Richard Bondi W'PONDS  Book 2000
005.82 Cta/Rsa 2006 : Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings / David Pointcheval (Ed.)     
      Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings / David Pointcheval (Ed.) MELB  Book 2006
005.82 Cur/Bfc : Brute force : cracking the data encryption standard / Matt Curtin     
      Brute force : cracking the data encryption standard / Matt Curtin W'PONDS  Book 2005
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next