Limit search to available items
Nearby CLASS NUMBERS are:
Result Page   Previous Page Next Page  
Add Marked to Bag Add All On Page
Save   Media Year
005.8 BIS : Bishop, David,     
      Introduction to cryptography with Java applets / David Bishop. Bishop, David,; Main Stack Moylish:AVAILABLE   BOOK 2003
005.8 BRO    
      Programming Windows security / Keith Brown. Brown, Keith,; Main Stack Moylish:AVAILABLE   BOOK c2000
      Computer evidence : collection & preservation / Christopher L.T. Brown. Brown, Christopher L. T.; Main Stack Moylish:AVAILABLE   BOOK c2006
      Programming Windows security / Keith Brown. Brown, Keith,; Main Stack Moylish:AVAILABLE   BOOK c2000
005.8 BUN : Bunting, Steve.     
      EnCase computer forensics : the official EnCE EnCase certified examiner study guide / Steve Bunting. Bunting, Steve.; Main Stack Moylish:AVAILABLE   BOOK 2007
005.8 CAR    
      Nessus network auditing / Russ Rogers, technical editor ; Mark Carey, Paul Criscuolo, Mike Petruzzi. Carey, Mark.; Main Stack Moylish:AVAILABLE   BOOK c2008
      Windows forensic analysis : DVD toolkit, / Harlan Carvey. Carvey, Harlan A.; Main Stack Moylish:AVAILABLE   BOOK c2007
      Windows forensic analysis DVD toolkit 2E / Harlan Carvey ; Eoghan Casey, technical editor. Carvey, Harlan A.; Main Stack Moylish:AVAILABLE   BOOK c2009
005.8 CAS    
      Handbook of computer crime investigation : forensic tools and technology / edited by Eoghan Casey. Main Stack Moylish:AVAILABLE   BOOK c2002
      Handbook of computer crime investigation : forensic tools and technology / edited by Eoghan Casey. Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 CHA : Chapman, David     
      Cisco secure PIX firewalls Chapman, David; Main Stack Thurles:AVAILABLE   BOOK 2002
005.8 CHE : Cheswick, William R.     
      Firewall and Internet security / Repelling the wily hacker REPELLING THE WILEY HACKER Cheswick, William R.; Main Stack Thurles:AVAILABLE   BOOK 1994
005.8 CHI    
      Access control, security, and trust : a logical approach / Shiu-Kai Chin, Susan Beth Older. Chin, Shiu-Kai.; Main Stack Thurles:AVAILABLE   BOOK 2011
      Access control, security, and trust : a logical approach / Shiu-Kai Chin, Susan Beth Older. Chin, Shiu-Kai.; Main Stack Thurles:AVAILABLE   BOOK 2011
005.8 COH : Cohen, Tyler.     
      Alternate data storage forensics / Tyler Cohen, Amber Schroader. Cohen, Tyler.; Main Stack Moylish:AVAILABLE   BOOK c2007
005.8 COL : Cole, Eric.     
      Network security bible / Eric Cole, Ronald Krutz, James W. Conley. Cole, Eric.; Main Stack Moylish:AVAILABLE   BOOK c2009
005.8 CRO : Crowley, Paul.     
      CD and DVD forensics / Paul Crowley ; Dave Kleiman, technical editor. Crowley, Paul.; Main Stack Moylish:AVAILABLE   BOOK c2007
005.8 CRU    
      Inside Internet Security Crume, Jeff; Main Stack Thurles:AVAILABLE   BOOK 2000
      Inside Internet Security Crume, Jeff; Main Stack Thurles:AVAILABLE   BOOK 2000
      Inside Internet Security Crume, Jeff; Main Stack Thurles:AVAILABLE   BOOK 2000
      Inside Internet Security Crume, Jeff; Main Stack Thurles:AVAILABLE   BOOK 2000
005.8 EAR : Earle, Aaron E.     
      Wireless security handbook / Aaron E. Earle. Earle, Aaron E.; Main Stack Moylish:AVAILABLE   BOOK 2005
005.8 ECDL : CiA Training Limited     
      BCS level 2 : certificate for i t users : unit e - unit i t : using microsoft windows xp : micros CiA Training Limited; Short Loan Moylish:AVAILABLE   BOOK 2003
005.8 ERB    
      Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er Erbschloe, Michael,; Main Stack Moylish:AVAILABLE   BOOK c2005
      Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er Erbschloe, Michael,; Main Stack Moylish:AVAILABLE   BOOK c2005
005.8 FAD    
      Unofficial guide to ethical hacking / Ankit Fadia. Fadia, Ankit,; Main Stack Moylish:AVAILABLE   BOOK c2002
      The unofficial guide to ethical hacking / Ankit Fadia. Fadia, Ankit,  BOOK c2006
005.8 FAR    
      Forensic discovery / Dan Farmer, Wietse Venema. Farmer, Dan.; Main Stack Moylish:AVAILABLE   BOOK c2005
      LAN times guide to security and data integrity Marc Farley, Tom Stearns, and Jeffrey Hsu Farley, Marc.; Main Stack Moylish:AVAILABLE   BOOK c1996
005.8 FOR    
      Cryptography and network security / Behrouz A. Forouzan. Forouzan, Behrouz A.; Main Stack Moylish:AVAILABLE   BOOK 2008
      Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warw Ford, Warwick.; Main Stack Moylish:AVAILABLE   BOOK c2001
005.8 GAR : Garfinkel, Simson.     
      Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz. Garfinkel, Simson.  BOOK c2003
005.8 GHO : Ghorbani, Ali,     
      Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbo Ghorbani, Ali,; Main Stack Moylish:AVAILABLE   BOOK c2010
005.8 GOL    
      Computer security Gollman, Dieter; Main Stack Thurles:AVAILABLE   BOOK 1998
      Computer security Gollman, Dieter; Main Stack Thurles:AVAILABLE   BOOK 1998
      Computer security / Dieter Gollmann. Gollmann, Dieter.; Main Stack Moylish:AVAILABLE   BOOK c2006
005.8 GOR    
      Practical data security / edited by John Gordon. Main Stack Moylish:AVAILABLE   BOOK c1993
      Practical data security / edited by John Gordon. Main Stack Moylish:AVAILABLE   BOOK c1993
005.8 HER    
      A practical guide to security engineering and information assurance / Debra S. Herrmann. Herrmann, Debra S.; Main Stack Moylish:AVAILABLE   BOOK c2002
      A practical guide to security engineering and information assurance / Debra S. Herrmann. Herrmann, Debra S.; Main Stack Moylish:AVAILABLE   BOOK c2002
      Using the common criteria for IT security evaluation / Debra S. Herrmann. Herrmann, Debra S.  BOOK c2003
005.8 HON      
      Know your enemy : learning about security threats / The Honeynet Project. Main Stack Moylish:AVAILABLE   BOOK c2004
005.8 JAC : Jackson, Chris,     
      Network security auditing / Chris Jackson. Jackson, Chris,; Main Stack Moylish:AVAILABLE   BOOK c2010
005.8 JON    
      Internet forensics / Robert Jones. Jones, Robert.; Main Stack Moylish:AVAILABLE   BOOK c2006
      Risk management for computer security : Protecting your network and information assets / by Andy Jone Jones, Andy,  BOOK c2005
005.8 KAS    
      Data recovery : tips & solutions : Windows, Linux, and BSD / Kris Kaspersky. Kaspersky, Kris.; Main Stack Moylish:AVAILABLE   BOOK c2006
      Hacker disassembling uncovered / Kris Kaspersky. Kaspersky, Kris.; Main Stack Moylish:AVAILABLE   BOOK c2007
005.8 KAU : Kaufman, Charlie.     
      Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Spe Kaufman, Charlie.; Main Stack Thurles:AVAILABLE   BOOK 2002
005.8 KEN      
      Metasploit : the penetration tester's guide / by David Kennedy ... [et al.]. Main Stack Moylish:AVAILABLE   BOOK c2011
005.8 KIP    
      Investigator's guide to steganography / Gregory Kipper. Kipper, Gregory.; Main Stack Moylish:AVAILABLE   BOOK c2004
      Investigator's guide to steganography / Gregory Kipper. Kipper, Gregory.; Main Stack Moylish:AVAILABLE   BOOK c2004
005.8 KIZ : Kizza, Joseph Migga.     
      Computer network security / Joseph Migga Kizza. Kizza, Joseph Migga.; Main Stack Moylish:AVAILABLE   BOOK 2010
005.8 KRU    
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. Kruse, Warren G.; Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. Kruse, Warren G.; Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
      The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean Krutz, Ronald L.,; Main Stack Moylish:AVAILABLE   BOOK c2001
      The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean Krutz, Ronald L.,; Main Stack Moylish:AVAILABLE   BOOK c2001
      Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. Kruse, Warren G.; Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
005.8 LEH : Lehtinen, Rick.     
      Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr. Lehtinen, Rick.; Main Stack Moylish:AVAILABLE   BOOK c2006
005.8 MAL : Malin, Cameron H.     
      Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin Malin, Cameron H.; Main Stack Moylish:AVAILABLE   BOOK c2012
005.8 MCC : MCCLURE STUART     
      HACKING EXPOSED NETWORK SECURITY SECRETS AND SOLUTIONS MCCLURE STUART; Main Stack Thurles:AVAILABLE   BOOK 1999
005.8 MEN    
      Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Menezes, A. J.; Main Stack Moylish:AVAILABLE   BOOK 2001
      Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Menezes, A. J.; Main Stack Moylish:AVAILABLE   BOOK 2001
005.8 MID    
      Cyber crime investigator's field guide / Bruce Middleton. Middleton, Bruce.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Cyber crime investigator's field guide / Bruce Middleton. Middleton, Bruce.; Main Stack Moylish:AVAILABLE   BOOK 2002
005.8 NEL    
      Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips. Nelson, Bill.; Main Stack Moylish:AVAILABLE   BOOK 2004
      Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips. Nelson, Bill.; Main Stack Moylish:AVAILABLE   BOOK 2004
005.8 NOR    
      Network intrusion detection / Stephen Northcutt, Judy Novak. Northcutt, Stephen.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Network intrusion detection / Stephen Northcutt, Judy Novak. Northcutt, Stephen.; Main Stack Moylish:AVAILABLE   BOOK 2002
005.8 OKU : Okuntseff, Nik.     
      Windows NT security : programming easy-to-use security options. Okuntseff, Nik.; Main Stack Moylish:AVAILABLE   BOOK 1997
005.8 OPP : Oppliger, Rolf.     
      Internet and Intranet security Rolf Oppliger Oppliger, Rolf.; Main Stack Moylish:AVAILABLE   BOOK c1998
005.8 ORI : Oriyano, Sean-Philip,     
      CEH certified ethical hacker study guide : version 9 / Sean-Philip Oriyano. Oriyano, Sean-Philip,; Main Stack Moylish:AVAILABLE   BOOK 2016
005.8 PEL    
      Information security policies, procedures, and standards : guidelines for effective information secur Peltier, Thomas R.; Main Stack Moylish:AVAILABLE   BOOK c2002
      Information security policies, procedures, and standards : guidelines for effective information secur Peltier, Thomas R.; Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 POG : Pogue, Chris.     
      Unix and Linux forensic analysis DVD toolkit / Chris Pogue, Cory Altheide, Todd Haverkos. Pogue, Chris.; Main Stack Moylish:AVAILABLE   BOOK c2008
005.8 POW    
      Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power. Power, Richard,; Main Stack Moylish:AVAILABLE   BOOK c2000
      Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power. Power, Richard,; Main Stack Moylish:AVAILABLE   BOOK c2000
005.8 PUR : Purser, Michael,     
      Secure data networking Michael Purser Purser, Michael,; Main Stack Moylish:AVAILABLE   BOOK c1993
005.8 RAM : Ramachandran, Vivek.     
      Backtrack 5 wireless penetration testing : beginner's guide / Vivek Ramachandran. Ramachandran, Vivek.; Main Stack Moylish:AVAILABLE   BOOK 2011
005.8 RAV : Raval, Vasant.     
      Risks, controls, and security : concepts and applications / Vasant Raval; Ashok Fichadia. Raval, Vasant.; Main Stack Moylish:AVAILABLE   BOOK 2007
005.8 RHE : Rhee, Man Young.     
      Mobile communication systems and security / Man Young Rhee. Rhee, Man Young.; Main Stack Moylish:AVAILABLE   BOOK c2009
005.8 RUT : RUTSTEIN CHARLES B     
      WINDOWS NT SECURITY RUTSTEIN CHARLES B; Main Stack Thurles:AVAILABLE   BOOK 1997
Add Marked to Bag Add All On Page
Result Page   Previous Page Next Page