Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.8 Iso/Csr 2019 : Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch (Eds.)     
      Computer safety, reliability, and security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE and WAISE, Turku, Finland, September 10, 2019 : proceedings / Alexander Romanovsky, Elena Troubitsyn W'PONDS  Book 2019
005.8 Isp/Ecc 2005 : Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.)     
      Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings / Robert H. Deng ... [and others] (eds.) W'PONDS  Book 2005
005.8 Isw/Ise 1999 : Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.)     
      Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / Masahiro Mambo, Yuliang Zheng (eds.) W'PONDS  Book 1999
005.8 Isw/Ise 2000 : Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.)     
      Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) W'PONDS  Book 2000
005.8 Iwd/Waa 2003 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.) W'PONDS  Book 2004
005.8 Iwd/Waa 2004 : Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)     
      Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers / Ton Kalker, Ingemar Cox, Yong Man Ro (eds.) W'PONDS  Book 2005
005.8 Iwo/Dfa 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge     
      Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) : Crete, Greece 6-8 June 2012 / editors: Nathan Clarke, Theodore Tryfonas, Ronald Dodge W'PONDS  Book 2012
005.8 Iwo/Tap 2005 : Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.)     
      Public Key Cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.) W'PONDS  Book 2005
005.8 Jac/Eis : Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs     
      Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs W'PONDS  Book 2011
005.8 Jac/Itn    
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
      Introduction to network security / Douglas Jacobson MELB, W'PONDS   Book 2009
005.8 Jaj/Csa : Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors     
      Cyber situational awareness : issues and research / Sushil Jajodia ... [and others], editors W'PONDS  Book 2010
005.8 Jaj/Iai : Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland / edited by Sushil Jajodia ... [and others]     
      Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland W'PONDS  Book 1997-
005.8 Jak/Cun : Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan     
      Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan W'PONDS  Book 2008
005.8 Jan/Daf    
      Data analytics for cybersecurity / Vandana P. Janeja GIFT CITY  Book 2022
      Data analytics for cybersecurity / Vandana P. Janeja GIFT CITY  Book 2022
005.8 Jan/Iai : Internet and intranet security management : risks and solutions / Lech Janczewski     
      Internet and intranet security management : risks and solutions / Lech Janczewski W'PONDS  Book 2000
005.8 Jav/Oad : Optical and digital techniques for information security / Bahram Javidi, editor     
      Optical and digital techniques for information security / Bahram Javidi, editor W'PONDS  Book 2005
005.8 Java Mac/Jns : Java network security / Robert MacGregor ... [and others]     
      Java network security / Robert MacGregor ... [and others] W'PONDS  Book 1998
005.8 Java Oak/Jse 2001 : Java security / Scott Oaks     
      Java security / Scott Oaks W'PONDS  Book 2001
005.8 Jon/Aht : Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson     
      Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson W'PONDS  Book 2002
005.8 Jon/Ifo : Internet forensics / Robert Jones     
      Internet forensics / Robert Jones W'PONDS  Book 2006
005.8 Kam/Nsa    
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
      Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail MELB, W'PONDS   Book 2007
005.8 Kan/Psa : PC security and virus protection : the ongoing war against information sabotage / Pamela Kane     
      PC security and virus protection : the ongoing war against information sabotage / Pamela Kane W'PONDS  Book 1994
005.8 Kat/Itm    
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
      Introduction to modern cryptography : principles and protocols / Jonathan Katz and Yehuda Lindell MELB, W'PONDS   Book 2007
005.8 Kau/Nsp 2002 : Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner     
      Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner W'PONDS  Book 2002
005.8 Kee/Ecr : Electronic commerce relationships : trust by design / Peter Keen ... [and others]     
      Electronic commerce relationships : trust by design / Peter Keen ... [and others] W'PONDS  Book 2000
005.8 Khu/Saa    
      Security analytics : a data centric approach to information security / edited by Mehak Khurana, Shilpa Mahajan GIFT CITY  Book 2022
      Security analytics : a data centric approach to information security / edited by Mehak Khurana, Shilpa Mahajan GIFT CITY  Book 2022
005.8 Kim/Hpt    
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
      The hacker playbook 2 : practical guide to penetration testing / Peter Kim MELB  Book 2015
005.8 Kim/Hpt 2018 : The hacker playbook 3 : practical guide to penetration testing / Peter Kim     
      The hacker playbook 3 : practical guide to penetration testing / Peter Kim DPD, MELB, W'PONDS   Book 2018
005.8 Kin/Spt    
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
      Security+ training guide / Todd King and David Bittlingmeier MELB, W'PONDS   Book 2003
005.8 Kiz/Cns    
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
      Computer network security / Joseph Migga Kizza MELB, W'PONDS   Book 2005
005.8 Kiz/Cns 2011    
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
      Computer network security and cyber ethics / Joseph Migga Kizza MELB, W'BOOL, W'PONDS   Book 2011
005.8 Kiz/Gtc 2012 : A guide to computer network security / Joseph Migga Kizza     
      A guide to computer network security / Joseph Migga Kizza W'PONDS  Book 2012
005.8 Kna/Csa : Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp     
      Cyber-security and global information assurance : threat analysis and response solutions / [edited by] Kenneth J. Knapp W'PONDS  Book 2009
005.8 Kov/Iss : The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich     
      The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich W'PONDS  Book 1998
005.8 Kra/Itn : Introduction to network security / Neal Krawetz     
      Introduction to network security / Neal Krawetz MELB  Book 2007
005.8 Kru/Cfi : Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser     
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser MELB  Book 2002
005.8 Kru/Cpg : The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines     
      The CISSP prep guide / Ronald L. Krutz, Russell Dean Vines W'PONDS  Book 2003
005.8 Kru/Sis : The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors     
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors MELB  Book 2013
005.8 Lar/Aws : Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens     
      Administrating Web servers, security & maintenance / Eric Larson, Brian Stephens W'PONDS  Book 2000
005.8 Lee/Bdc : Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon     
      Botnet detection : countering the largest security threat / edited by Wenke Lee, Cliff Wang and David Dagon W'PONDS  Book 2007
005.8 Lig/Mac : Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others]     
      Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [and others] MELB  Book 2011
005.8 Lim/Isa 2003 : Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)     
      Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.) W'PONDS  Book 2004
005.8 Linux Man/Lss : Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell     
      Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell W'PONDS  Book 2000
005.8 Llo/Upc 2003 : Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd     
      Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd W'PONDS  Book 2003
005.8 Los/Isr    
      IT security risk management in the context of cloud computing : towards an understanding of the key role of providers' IT security risk perceptions / André Loske ; with a foreword by Peter Buxma GIFT CITY  Book 2015
      IT security risk management in the context of cloud computing : towards an understanding of the key role of providers' IT security risk perceptions / André Loske ; with a foreword by Peter Buxma GIFT CITY  Book 2015
005.8 Lui/Sap    
      Security and policy driven computing / Lei Liu W'PONDS  Book 2011
      Security and policy driven computing / Lei Liu W'PONDS  Book 2011
005.8 Mai/Spa : Security planning & disaster recovery / Eric Maiwald, William Sieglein     
      Security planning & disaster recovery / Eric Maiwald, William Sieglein W'PONDS  Book 2002
005.8 Mal/Mla : Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.)     
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof (ed.) W'PONDS  Book 2006
005.8 Man/Paa : Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp     
      Power analysis attacks : revealing the secrets of smart cards / by Stefan Mangard, Elisabeth Oswald, Thomas Popp W'PONDS  Book 2007
005.8 Mao/Mct : Modern cryptography : theory and practice / Wenbo Mao     
      Modern cryptography : theory and practice / Wenbo Mao W'PONDS  Book 2004
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next