005.8 Int/Ito : Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire / International Organization for Standardization
Information technology, security techniques : information security management systems - overview and vocabulary = systémes de management de la sécurité de l'information - vue d'ensemble et vocabulaire
W'PONDS
2014
005.8 Int/Itp : Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization
Information technology, security techniques : privacy architecture framework = architecture de référence de la protection de la vie privée / International Organization for Standardization
W'PONDS
2013
005.8 Int/Itr : Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de l'information - exigences / International Organization for Standardization
Information technology, security techniques : information security management systems - requirements = Technologies de l'information - techniques de sécurité : systémes de management de la sécurité de
W'PONDS
2013
005.8 Int/Its : Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security techniques]
Information technology - security measures - information security management - measurement / [prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 27, Security t
W'PONDS
2008
005.8 Int/Its 2012 : Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization for Standardization
Information technology, security techniques, guidelines for cybersecurity = Technologies de l'information, techniques de sécurité, lignes directrices pour la cybersécurité / International Organization
WATERFT
2012
005.8 Int/Itu : Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acquisition et la préservation de preuves numériques / International Organization for Standardization
Information technology, security techniques : guidelines for identification, collection, acquisition, and preservation of digital evidence = lignes directrices pour l'identification, la collecte, l'acq
W'PONDS
2012
005.8 Int/Itv : Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization
Information technology, security techniques : vulnerability handling processes = processus de traitement de la vulnérabilité / International Organization for Standardization
W'PONDS
2013
005.8 Int/Sip 2005 : Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)
Security in pervasive computing : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, proceedings / Dieter Hutter, Markus Ullmann (eds.)
W'PONDS
2005
005.8 Intern Che/Fai : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin
Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin
W'PONDS
1994
005.8 Intern Che/Fai 2003 : Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin
Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin
MELB
iOS hacker's handbook / Charlie Miller ... [and others]
MELB
2012
iOS hacker's handbook / Charlie Miller ... [and others]
MELB
2012
iOS hacker's handbook / Charlie Miller ... [and others]
MELB
2012
005.8 Isc/Isc 2004 : Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.)
Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings / Kan Zhang, Yuliang Zheng (eds.)
W'PONDS
2004
005.8 Isc/Isc 2006 : Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.)
Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas ... [and others] (eds.)
W'PONDS
2006
005.8 Isd/Isa : Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.)
Information Security and Digital Forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / Dasun Weerasinghe (ed.)
MELB
2010
005.8 Iso/Csr 2019 : Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch (Eds.)
Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyn
W'PONDS
2019
005.8 Isp/Ecc 2005 : Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.)
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.)
W'PONDS
2005
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)
Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)
W'PONDS
1999
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)
Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)
W'PONDS
2000
005.8 Iti/Isc 2009 : Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier Lopez (eds.)
Emerging challenges for security, privacy and trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009 : proceedings / Dimitris Gritzalis, Javier
MELB
2009
005.8 Iti/Isc 2010 : Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings / Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.)
Security and privacy - silver linings in the cloud : 25th IFIP TC 11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 procee
MELB
2010
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)
Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)
W'PONDS
2004
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)
Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)
W'PONDS
2005
005.8 Iwo/Csa 2012 : Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)
Cyberspace safety and security : 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13 2012 : proceedings / Yang Xiang ... [and others] (eds.)
MELB
2012
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge
Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge
W'PONDS
2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)
Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)
W'PONDS
Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors
MELB, W'PONDS
2010
Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors
MELB, W'PONDS
2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]
Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edi
W'PONDS
1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan
Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan
W'PONDS
2008
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski
Internet and intranet security management : risks and solutions / Lech Janczewski
W'PONDS
2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor
Optical and digital techniques for information security / Bahram Javidi, editor
W'PONDS