Limit search to available items
Result Page   
Save marked records Save all on page
BJL CLASSMARKS (1-50 of 130)
QA 76.88 H6
1
Mark
  High-performance computing and networking : international conference and exhibition, Vienna, Austria

Berlin : Springer, 1997.  
1997
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.88 H6  8 WEEK LOAN  AVAILABLE
2
Mark
  High-performance computing and networking : international conference and exhibition, HPCN EUROPE 196

Berlin : Springer, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.88 H6  8 WEEK LOAN  AVAILABLE
QA 76.88 S6
3
Mark
  The software optimization cookbook : high performance recipes for IA-32 platforms

Hillsboro, Or. : Intel Press, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.88 S6  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.88 S6  8 WEEK LOAN  AVAILABLE
QA 76.889 B4
4
Mark
  Principles of quantum computation and information. Volume I : Basic concepts
Benenti, Giuliano.
River Edge, N.J. : World Scientific, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 B4  8 WEEK LOAN  AVAILABLE
QA 76.889 I6
5
Mark
  Introduction to quantum computation and information

Singapore : World Scientific, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 I6  8 WEEK LOAN  AVAILABLE
QA76.889 .L57 2014eb
6
Mark
  Quantum algorithms via linear algebra : a primer
Lipton, Richard J.
Cambridge, Massachusetts : The MIT Press, [2014] -Access this resource online
2014
EBOOKS
QA 76.889 N6
7
Mark
  Quantum computation and quantum information
Nielsen, Michael A., 1974-
Cambridge : Cambridge University Press, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 N6  8 WEEK LOAN  DUE 29-05-24
 BJL 3rd Floor  QA 76.889 N6  8 WEEK LOAN  DUE 12-06-24
QA 76.889 P5
8
Mark
  The physics of quantum information : quantum cryptography, quantum teleportation, quantum computatio

New York : Springer, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 P5  8 WEEK LOAN  AVAILABLE
QA 76.889 Q1
9
Mark
  Quantum computing and communications

London : Springer Verlag, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 Q1  8 WEEK LOAN  AVAILABLE
QA 76.889 R5
10
Mark
  Quantum computing : a gentle introduction
Rieffel, Eleanor, 1965-
Cambridge, Mass. ; London : MIT Press, c2011.  
c2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 R5  8 WEEK LOAN  AVAILABLE
QA 76.889 Y2
11
Mark
  Quantum computing for computer scientists
Yanofsky, Noson S., 1967-
Cambridge : New York : Cambridge University Press, 2008.  
2008
BOOK
QA 76.89 C9
12
Mark
  Developing Tablet PC applications.
Crooks, Clayton E.
Hingham, Mass. : Charles River Media, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.89 C9  8 WEEK LOAN  AVAILABLE
QA 76.89 J3
13
Mark
  Building Tablet PC applications
Jarrett, Rob, 1969-
Redmond, Wash. : Microsoft Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.89 J3  8 WEEK LOAN  AVAILABLE
QA 76.9 A23 H3
14
Mark
  Abstract data types in Modula-2.
Harrison, Rachel, , 1960-
Chichester : Wiley, 1989.  
1989
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A23 H3  8 WEEK LOAN  AVAILABLE
15
Mark
  Abstract data types in standard ML.
Harrison, Rachel, , 1960-
Chichester : Wiley, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A23 H3  8 WEEK LOAN  AVAILABLE
QA 76.9 A23 R2
16
Mark
  Recent trends in data type specification : 7th Workshop on specification of abstract data types, Wus

Berlin : Springer-Verlag, 1991.  
1991
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A23 R2  8 WEEK LOAN  AVAILABLE
17
Mark
  Recent trends in data type specifications : 5th workshop on specification of Abstract Data Types, Gu

Berlin : Springer, 1988.  
1988
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A23 R2  8 WEEK LOAN  AVAILABLE
QA 76.9 A23 T4
18
Mark
  Abstract data types : their specification representation, and use
Thomas, Peter G.
Oxford : Clarendon Press, 1988.  
1988
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A23 T4  8 WEEK LOAN  AVAILABLE
QA76.9.A25
19
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.  
c2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCA  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 A1
20
Mark
  Access denied : the practice and policy of global internet filtering

Cambridge, Mass. : MIT Press, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A1  8 WEEK LOAN  AVAILABLE
21
Mark
  Proceedings of Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, June 3-
ACM Symposium on Access Control Models and Technologies (7th : 2002 : Monterey, Calif.)
New York : Association for Computing Machinery, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 A5
22
Mark
  Security engineering : a guide to building dependable distributed systems
Anderson, Ross, 1956-
Indianapolis, Ind. : Wiley, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A5  8 WEEK LOAN  AVAILABLE
 BJL Reading Room Mezzanine  005.8 AND  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 B3
23
Mark
  Designing information systems security.
Baskerville, Richard.
Chichester : Wiley, 1988.  
1988
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B3  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B5
24
Mark
  Best truth : intelligence in the Information Age
Berkowitz, Bruce D., 1956-
New Haven, Conn. : Yale University Press, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B5  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B7
25
Mark
  Codes, ciphers, and computers : an introduction to information security.
Bosworth, Bruce.
Rochelle Park, N.J. : Hayden, 1982.  
1982
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B7  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B8
26
Mark
  Data protection : specification for a personal information management system.
British Standards Institution.
London : British Standards Institution, 2009.  
2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  NOT FOR LOAN  LIB USE ONLY
27
Mark
  Evidential weight and legal admissibility of electronic information : specification.
British Standards Institution.
London : British Standards Institution, 2008.  
2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  NOT FOR LOAN  LIB USE ONLY
28
Mark
  Information security management. Part 2 : Specification for information security management systems.
British Standards Institution.
London : BSI, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Pamphlet Collection p  q QA 76.9 A25 B8  8 WEEK LOAN  ASK at the Reading Room
29
Mark
  Information security management systems : part 3 guidelines for information security risk management
British Standards Institution.
London : British Standards Institution, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
30
Mark
  Information technology - code of practice for information security management.
British Standards Institution.
London : BSI, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
31
Mark
  Information technology - security techniques - Code of practice for information security management.
British Standards Institution.
London : British Standards Institution, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
32
Mark
  Information technology - security techniques - information security management systems - requirement
British Standards Institution.
London : British Standards Institution, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B9
33
Mark
  Information and secrecy : Vannevar Bush, Ultra, and the other Memex.
Burke, Colin B.
Metuchen, N.J. : Scarecrow Press, 1994.  
1994
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B9  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C1
34
Mark
  Information security handbook
Caelli, William.
Basingstoke : Macmillan, 1991.  
1991
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C6
35
Mark
  Computer fraud
Collier, P. A.
London : Chartered Institute of Management Accountants, 1990.  
1990
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Pamphlet Collection p  QA 76.9 A25 C6  8 WEEK LOAN  ASK at the Reading Room
 BJL 3rd Floor  QA 76.9 A25 C6  8 WEEK LOAN  AVAILABLE
36
Mark
  The prevention and detection of computer fraud
Collier, P.A.
London : Chartered Institute of Management Accountants, 1990.  
1990
BOOK
QA 76.9 A25 C65
37
Mark
  Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteen
Colloquy on European Law (14th : 1984 : Lisbon, Portugal)
Strasbourg : Council of Europe, 1985.  
1985
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 C65  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C9
38
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM Press, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C9  8 WEEK LOAN  AVAILABLE
QA76.9.A25 D5 2018
39
Mark
  Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.  
2018
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
QA76.9.A25 D8 2017
40
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
QA76.9.A25 E5425 2007
41
Mark
  Engaging privacy and information technology in a digital age

Washington, D.C. : National Academies Press, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 WAL  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 E6
42
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  DUE 13-05-24
QA 76.9 A25 F3
43
Mark
  Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.  
2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 F3  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 G6
44
Mark
  Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.  
2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 G6  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 G7
45
Mark
  Gray hat hacking : the ethical hacker's handbook

New York ; London : McGraw-Hill, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 G7  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 H1
46
Mark
  Cyberpunk : outlaws and hackers on the computer frontier
Hafner, Katie.
London : Corgi, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 H8
47
Mark
  Writing secure code
Howard, Michael, 1965-
Redmond, Wash. : Microsoft Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
Click to view copies/volumes at all libraries
QA 76.9 A25 H9
48
Mark
  Information warfare : corporate attack and defence in a digital world
Hutchinson, William.
Oxford : Butterworth-Heinemann, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H9  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 I6
49
Mark
  IEE proceedings : information security.
Institution of Electrical Engineers.
London : IEE, 2005-2006.  
2006
PERIODICAL
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL basement journals  q QA 76.9 A25 I6  2005/2006,v.152-153  7 DAYS  ASK at the Reading Room
50
Mark
  Information security handbook.
International Computers Limited.
London : ICL, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 I6  8 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results
Result Page