Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
Result Page
1
2
3
Next
SUBJECTS (1-50 of 105)
Computer Security
1
Mark
Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015]
Access this resource online
2015
EBOOKS
2
Mark
Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
3
Mark
The art of computer virus research and defense.
Szor, Peter.
Upper Saddle River, N.J. : Addison-Wesley, 2005.
2005
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.76 C68 S9
8 WEEK LOAN
AVAILABLE
4
Mark
The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 M6
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA 76.9 A25 M6
4 WEEK LOAN
AVAILABLE
5
Mark
The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963-
Indianapolis, Ind. : Wiley, c2002.
Access this resource online
c2002
EBOOKS
6
Mark
B2B and beyond : new business models built on trust
DeMaio, Harry B.
New York : John Wiley and Sobs, Inc., 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Teaching Reserve
658.0558 DEM
UNTIL CLOSING
ASK at the Reading Room
7
Mark
Bandits on the information superhighway.
Barrett, Daniel J.
Bonn : O'Reilly and Associates, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 BAR
4 WEEK LOAN
AVAILABLE
8
Mark
Best truth : intelligence in the Information Age
Berkowitz, Bruce D., 1956-
New Haven, Conn. : Yale University Press, c2000.
c2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 B5
8 WEEK LOAN
AVAILABLE
9
Mark
Big book of IPsec RFCs
Loshin, Peter.
San Diego, Calif. : Academic Press, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 L8
8 WEEK LOAN
AVAILABLE
10
Mark
Computer crime : a crimefighter's handbook
Icove, David J., 1949-
Sebastopol, Calif. : O'Reilly and Associates, 1995.
1995
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
HV 6773 I1
4 WEEK LOAN
AVAILABLE
11
Mark
Computer forensics and privacy
Caloyannides, Michael A.
Boston, Mass. ; London : Artech House, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
363.2502854 CAL
4 WEEK LOAN
AVAILABLE
12
Mark
Computer forensics : computer crime scene investigation
Vacca, John R.
Hingham, Mass. : Charles River Media, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 V1
4 WEEK LOAN
AVAILABLE
13
Mark
Computer forensics : incident response essentials
Kruse, Warren G.
Boston, Mass. : Addison-Wesley, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
363.2502854 KRU
4 WEEK LOAN
AVAILABLE
14
Mark
Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.
2011
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 G6
8 WEEK LOAN
AVAILABLE
15
Mark
Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]
2017
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA76.9.A25 D8 2017
8 WEEK LOAN
AVAILABLE
16
Mark
Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, 1991.
1991
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 RUS
4 WEEK LOAN
AVAILABLE
17
Mark
Computer security : principles and practice
Stallings, William.
Boston : Pearson, [2015]
Access this resource online
2015
EBOOKS
18
Mark
Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]
2015
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 S73 2015
4 WEEK LOAN
AVAILABLE
19
Mark
Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 D314 N5
4 WEEK LOAN
AVAILABLE
20
Mark
Computers, ethics & social values
London : Prentice Hall, 1995.
1995
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
174.90904 JOH
4 WEEK LOAN
AVAILABLE
21
Mark
Computers, ethics and society.
New York ; Oxford : Oxford University Press, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
303.4834 ERM
4 WEEK LOAN
AVAILABLE
22
Mark
The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.
1999
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 K8
8 WEEK LOAN
AVAILABLE
23
Mark
Crypto : secrecy and privacy in the new code war
Levy, Steven.
London : Penguin, c2000.
c2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 LEV
4 WEEK LOAN
AVAILABLE
24
Mark
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.
c2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 S7
8 WEEK LOAN
AVAILABLE
25
Mark
Cryptography decrypted
Mel, H. X., 1948- author.
Boston, Mass. : Addison-Wesley, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 M5
4 WEEK LOAN
AVAILABLE
26
Mark
Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.
2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 F3
8 WEEK LOAN
AVAILABLE
27
Mark
Current security management & ethical issues of information technology
Hershey, Pa : IRM Press, c2003.
c2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 C9
8 WEEK LOAN
AVAILABLE
28
Mark
Current security management & ethical issues of information technology
Hershey, Pa : IRM, c2003.
Access this resource online
c2003
EBOOKS
29
Mark
Cyber blockades
Russell, Alison Lawlor.
Washington DC : Georgetown University Press, [2014]
Access this resource online
2014
EBOOKS
30
Mark
Cyber security for educational leaders : a guide to understanding and implementing technology polici
Phillips, Richard, 1958-
New York : Routledge, 2013.
2013
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
LB 1028.3 P5
8 WEEK LOAN
AVAILABLE
31
Mark
Cyberpunk : outlaws and hackers on the computer frontier
Hafner, Katie.
London : Corgi, 1993.
1993
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 H1
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 H1
8 WEEK LOAN
AVAILABLE
32
Mark
Cybersecurity and cyberwar : what everyone needs to know
Singer, Peter, 1946-
New York ; Oxford : Oxford University Press, 2013.
Access this resource online
2013
EBOOKS
33
Mark
Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.
2018
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
34
Mark
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018.
Access this resource online
2018
EBOOKS
35
Mark
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in
Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014.
Access this resource online
2014
EBOOKS
36
Mark
Data and computer security : dictionary of standards concepts and terms
Longley, Dennis.
Basingstoke : Macmillan, 1989.
1989
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 L8
NOT FOR LOAN
LIB USE ONLY
37
Mark
Digital copyright protection.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1997.
1997
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 W3
8 WEEK LOAN
AVAILABLE
38
Mark
Digital identity
Windley, Phillip J., 1958-
Sebastopol, Calif. : O'Reilly, 2005.
2005
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 W7
8 WEEK LOAN
AVAILABLE
39
Mark
Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016.
Access this resource online
2016
EBOOKS
40
Mark
Elementary information security
Smith, Richard E., 1952- author.
Burlington, MA : Jones & Bartlett Learning, [2016]
2016
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 S652 2016
4 WEEK LOAN
AVAILABLE
41
Mark
Enterprise security : IT security solutions : concepts, practical experiences, technologies
Erlangen : Publicis Corporate, 2006.
2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Teaching Reserve
658.4038011 FUM
UNTIL CLOSING
ASK at the Reading Room
42
Mark
Fighting computer crime : a new framework for protecting information.
Parker, Donn B.
Chichester : J. Wiley, 1998.
1998
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Teaching Reserve
658.478 PAR
UNTIL CLOSING
ASK at the Reading Room
43
Mark
Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.
c2014
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 K536 2014
4 WEEK LOAN
AVAILABLE
44
Mark
Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
025.04 LON
4 WEEK LOAN
AVAILABLE
45
Mark
Hackers
Levy, Steven.
Farnham : O'Reilly, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
364.168 LEV
4 WEEK LOAN
AVAILABLE
46
Mark
Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.
c2011
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 SCA
4 WEEK LOAN
AVAILABLE
47
Mark
Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
New York ; London : McGraw-Hill, c2011.
Access this resource online
c2011
EBOOKS
48
Mark
Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.
2007
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 E6
4 WEEK LOAN
DUE 13-05-24
49
Mark
Implementing biometric security
Chirillo, John, 1970-
New York : Wiley, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 CHI
4 WEEK LOAN
AVAILABLE
50
Mark
Implementing SSH : strategies for optimizing the secure shell
Dwivedi, Himanshu.
New York : Wiley, c2004.
c2004
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 DWI
4 WEEK LOAN
AVAILABLE
Result Page
1
2
3
Next