Limit search to available items
Nearby CLASS NUMBERS are:
Result Page   Previous Page Next Page  
Add Marked to Bag Add All On Page
Save   Media Year
005.8 MAL : Malin, Cameron H.     
      Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin Malin, Cameron H.; Main Stack Moylish:AVAILABLE   BOOK c2012
005.8 MCC : MCCLURE STUART     
      HACKING EXPOSED NETWORK SECURITY SECRETS AND SOLUTIONS MCCLURE STUART; Main Stack Thurles:AVAILABLE   BOOK 1999
005.8 MEN    
      Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Menezes, A. J.; Main Stack Moylish:AVAILABLE   BOOK 2001
      Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Menezes, A. J.; Main Stack Moylish:AVAILABLE   BOOK 2001
005.8 MID    
      Cyber crime investigator's field guide / Bruce Middleton. Middleton, Bruce.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Cyber crime investigator's field guide / Bruce Middleton. Middleton, Bruce.; Main Stack Moylish:AVAILABLE   BOOK 2002
005.8 NEL    
      Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips. Nelson, Bill.; Main Stack Moylish:AVAILABLE   BOOK 2004
      Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips. Nelson, Bill.; Main Stack Moylish:AVAILABLE   BOOK 2004
005.8 NOR    
      Network intrusion detection / Stephen Northcutt, Judy Novak. Northcutt, Stephen.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Network intrusion detection / Stephen Northcutt, Judy Novak. Northcutt, Stephen.; Main Stack Moylish:AVAILABLE   BOOK 2002
005.8 OKU : Okuntseff, Nik.     
      Windows NT security : programming easy-to-use security options. Okuntseff, Nik.; Main Stack Moylish:AVAILABLE   BOOK 1997
005.8 OPP : Oppliger, Rolf.     
      Internet and Intranet security Rolf Oppliger Oppliger, Rolf.; Main Stack Moylish:AVAILABLE   BOOK c1998
005.8 ORI : Oriyano, Sean-Philip,     
      CEH certified ethical hacker study guide : version 9 / Sean-Philip Oriyano. Oriyano, Sean-Philip,; Main Stack Moylish:AVAILABLE   BOOK 2016
005.8 PEL    
      Information security policies, procedures, and standards : guidelines for effective information secur Peltier, Thomas R.; Main Stack Moylish:AVAILABLE   BOOK c2002
      Information security policies, procedures, and standards : guidelines for effective information secur Peltier, Thomas R.; Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 POG : Pogue, Chris.     
      Unix and Linux forensic analysis DVD toolkit / Chris Pogue, Cory Altheide, Todd Haverkos. Pogue, Chris.; Main Stack Moylish:AVAILABLE   BOOK c2008
005.8 POW    
      Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power. Power, Richard,; Main Stack Moylish:AVAILABLE   BOOK c2000
      Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power. Power, Richard,; Main Stack Moylish:AVAILABLE   BOOK c2000
005.8 PUR : Purser, Michael,     
      Secure data networking Michael Purser Purser, Michael,; Main Stack Moylish:AVAILABLE   BOOK c1993
005.8 RAM : Ramachandran, Vivek.     
      Backtrack 5 wireless penetration testing : beginner's guide / Vivek Ramachandran. Ramachandran, Vivek.; Main Stack Moylish:AVAILABLE   BOOK 2011
005.8 RAV : Raval, Vasant.     
      Risks, controls, and security : concepts and applications / Vasant Raval; Ashok Fichadia. Raval, Vasant.; Main Stack Moylish:AVAILABLE   BOOK 2007
005.8 RHE : Rhee, Man Young.     
      Mobile communication systems and security / Man Young Rhee. Rhee, Man Young.; Main Stack Moylish:AVAILABLE   BOOK c2009
005.8 RUT : RUTSTEIN CHARLES B     
      WINDOWS NT SECURITY RUTSTEIN CHARLES B; Main Stack Thurles:AVAILABLE   BOOK 1997
005.8 SAM : Sammes, A. J.     
      Forensic computing / Tony Sammes and Brian Jenkinson. Sammes, A. J.; Main Stack Moylish:AVAILABLE   BOOK 2007
005.8 SCA    
      Hackers Exposed Scambray, Joel; Main Stack Thurles:AVAILABLE   BOOK
      Hackers Exposed Scambray, Joel; Main Stack Thurles:AVAILABLE   BOOK
      Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz. Scambray, Joel.; Main Stack Moylish:AVAILABLE   BOOK c2001
005.8 SCH    
      Incident response : a strategic guide to handling system and network security breaches / E. Eugene Schultz, E. Eugene.; Main Stack Moylish:AVAILABLE   BOOK c2002
      Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. Schneier, Bruce,; Main Stack Clonmel:AVAILABLE   BOOK 2015
      Applied cryptography : protocols, algorithms and source code in C. Schneier, Bruce,  BOOK c1996
      Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. Schneier, Bruce,; Main Stack Clonmel:AVAILABLE   BOOK 2015
      Incident response : a strategic guide to handling system and network security breaches / E. Eugene Schultz, E. Eugene.; Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 SHE : Shema, Mike.     
      Anti-hacker tool kit / Mike Shema ... [et al.]. Shema, Mike.; Main Stack Moylish:AVAILABLE   BOOK c2006
005.8 SHI    
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder; Ed Tittel, techni Shinder, Debra Littlejohn.; Main Stack Moylish:AVAILABLE   BOOK c2002
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder; Ed Tittel, techni Shinder, Debra Littlejohn.; Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 SKO : Skoudis, Ed.     
      Malware : fighting malicious code / Ed Skoudis. Skoudis, Ed.; Main Stack Moylish:AVAILABLE   BOOK 2003
005.8 SLA    
      Information security in financial services SLATER KEN; Main Stack Thurles:AVAILABLE   BOOK 1992
      Information security in financial services SLATER KEN; Main Stack Thurles:AVAILABLE   BOOK 1992
005.8 SMI : Smith, Richard E.,     
      Internet cryptography Richard E. Smith Smith, Richard E.,; Main Stack Moylish:AVAILABLE   BOOK c1997
005.8 SOL : Solomon, Michael,     
      Computer forensics jumpstart / Michael G. Solomon, Diane Barrett, Neil Broom. Solomon, Michael,; Main Stack Moylish:AVAILABLE   BOOK c2005
005.8 SPL    
      Testing web security : assessing the security of web sites and applications. Splaine, Steven.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Testing web security : assessing the security of web sites and applications. Splaine, Steven.; Main Stack Moylish:AVAILABLE   BOOK 2002
005.8 STA    
      Cryptography and network security principles and practice / William Stallings Stallings, William.; Main Stack Moylish:AVAILABLE   BOOK c1999
      Network security essentials : applications and standards / William Stallings. Stallings, William.; Main Stack Moylish:AVAILABLE   BOOK c2003
      Cryptography and network security : principles and practice / William Stallings. Stallings, William.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Cryptology and network security / Principles and practices STALLINGS WILLIAM; Main Stack Thurles:AVAILABLE   BOOK 1998
15 additional entries    
005.8 STI : Stinson, Douglas R.     
      Cryptography : theory and practice / Douglas R. Stinson. Stinson, Douglas R.; Main Stack Moylish:AVAILABLE   BOOK c1995
005.8 TIT : Tittel, Ed.     
      CISSP : Certified Information Systems Security Professional : study guide / Ed Tittel, James Michael Tittel, Ed.  BOOK 2005
005.8 TUN    
      Kerberos : a network authentication system. Tung, Brian.; Main Stack Moylish:AVAILABLE   BOOK 1999
      Kerberos : a network authentication system. Tung, Brian.; Main Stack Moylish:AVAILABLE   BOOK 1999
005.8 WAY    
      Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. Wayner, Peter,; Main Stack Moylish:AVAILABLE   BOOK c2002
      Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. Wayner, Peter,; Main Stack Moylish:AVAILABLE   BOOK c2002
005.8 ZWI    
      Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Bren Zwicky, Elizabeth D.; Main Stack Moylish:AVAILABLE   BOOK c2000
      Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Bren Zwicky, Elizabeth D.; Main Stack Moylish:AVAILABLE   BOOK c2000
005.82    
      Writing Secure Code (Howard & LeBlanc) 2nd edit Microsoft Press; Main Stack Thurles:AVAILABLE   BOOK
      Applied Cryptography Schneier, Bruce; Main Stack Thurles:AVAILABLE   BOOK
      Handbook of Applied Cryptography Menezes, Alfred J; Main Stack Thurles:AVAILABLE   BOOK
005.82 CAR : Carasik, Anne H.     
      Unix Secure Shell / Anne Carasik. Carasik, Anne H.; Main Stack Moylish:AVAILABLE   BOOK c1999
005.82 EAS      
      Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. Main Stack Moylish:AVAILABLE   BOOK 2015
005.84 : Aycock, John.     
      Computer viruses and malware / John Aycock. Aycock, John.; Main Stack Thurles:AVAILABLE   BOOK 2006
005.84 SYN      
      E-mail virus protection handbook. Main Stack Moylish:AVAILABLE   BOOK 2000
005.84 SZO : Szor, Peter.     
      The art of computer virus research and defense / Peter Szor. Szor, Peter.; Main Stack Moylish:AVAILABLE   BOOK 2005
005.86 PRE    
      Backup and recovery / W. Curtis Preston. Preston, W. Curtis.; Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE   BOOK c2007
      Backup and recovery / W. Curtis Preston. Preston, W. Curtis.; Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE   BOOK c2007
      Backup and recovery / W. Curtis Preston. Preston, W. Curtis.; Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE   BOOK c2007
006    
      CANopen implementation : applications to industrial networks / Mohammad Farsi and Manuel Bernardo Mar Farsi, Mohammad,; Main Stack Moylish:AVAILABLE   BOOK c2000
      CANopen implementation : applications to industrial networks / Mohammad Farsi and Manuel Bernardo Mar Farsi, Mohammad,; Main Stack Moylish:AVAILABLE   BOOK c2000
      Data acquisition and process control using personal computers Tarik Ozkul Ozkul, Tarik,; Main Stack Moylish:AVAILABLE   BOOK c1996
      Dynamic HTML master the essentials Joseph Schmuller Schmuller, Joseph.; Main Stack Moylish:AVAILABLE   BOOK 1998
      Mastering HTML 4.0 Deborah S. Ray, Eric J. Ray Ray, Deborah S.; Main Stack Moylish:AVAILABLE   BOOK c1997
006. 78 GEO    
      How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes. Georgenes, Chris.; Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE   BOOK 2010
      How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes. Georgenes, Chris.; Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE   BOOK 2010
      How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes. Georgenes, Chris.; Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE   BOOK 2010
006.06 : Ahearn, Luke     
      Designing 3D Games that Sell Ahearn, Luke; Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
006.06 AHE    
      Designing 3D Games that Sell Ahearn, Luke; Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
      Designing 3D Games that Sell Ahearn, Luke; Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
      Designing 3D Games that Sell Ahearn, Luke; Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE   BOOK 2001
006.1 : Andrews, Jean     
      A+Lab Manual for Guide tyo Managing and Maintaining your PC, 5th edit. Andrews, Jean; Main Stack Thurles:AVAILABLE   BOOK
006.3    
      The handbook of applied expert systems / edited by Jay Liebowitz. Main Stack Moylish:AVAILABLE   BOOK c1998
      Artificial intelligence : structures and strategies for complex problem solving. Luger, George F.; Main Stack Moylish:AVAILABLE   BOOK 2002
      Programming Collective Intelligence: Building smart web 2.0apps Segaran, Toby; Main Stack Thurles:AVAILABLE   BOOK
      Artificial intelligence for games Ian Millington and John Funge Millington, Ian; Main Stack Thurles:AVAILABLE   BOOK c2009
3 additional entries    
006.3 AZA : Azad, Pedram.     
      Computer vision : principles and practice / Pedram Azad, Tilo Gockel, Rüdiger Dillmann ; [translation Azad, Pedram.; Main Stack Moylish:AVAILABLE   BOOK 2008
006.3 BEA : Beasley, Michael,     
      Practical web analytics for user experience : how analytics can help you understand your users / Mich Beasley, Michael,; Main Stack Moylish:AVAILABLE   BOOK 2013
006.3 BOD    
      Artificial intelligence Boden/Second edition Boden, Margaret A.; Main Stack Thurles:AVAILABLE   BOOK 1996
      Artificial intelligence Boden/Second edition Boden, Margaret A.; Main Stack Thurles:AVAILABLE   BOOK 1996
      Artificial intelligence Boden/Second edition Boden, Margaret A.; Main Stack Thurles:AVAILABLE   BOOK 1996
      Artificial intelligence Boden/Second edition Boden, Margaret A.; Main Stack Thurles:AVAILABLE   BOOK 1996
      Artificial intelligence Boden/Second edition Boden, Margaret A.; Main Stack Thurles:AVAILABLE   BOOK 1996
006.3 BON : Bonnet, Alain.     
      Artificial intelligence : promise and performance / Alain Bonnet : preface by Jacques Pitrat : tra Bonnet, Alain.; Main Stack Moylish:AVAILABLE   BOOK c1985
Add Marked to Bag Add All On Page
Result Page   Previous Page Next Page