Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
(Search History)
KEYWORD: Computer security. in All Libraries
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
196 results found.
Sorted by
relevance
|
date
|
title
.
Result Page
1
2
3
4
Next
KEYWORDS (1-50 of 196)
Most relevant titles entries 1-11
1
Mark
Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]
2017
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA76.9.A25 D8 2017
8 WEEK LOAN
AVAILABLE
2
Mark
Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]
2015
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 S73 2015
4 WEEK LOAN
AVAILABLE
3
Mark
Computer security : principles and practice
Stallings, William.
Boston : Pearson, [2015]
Access this resource online
2015
EBOOKS
4
Mark
Principles of computer security CompTIA security+ and beyond (exam SY0-301)
New York : McGraw-Hill, c2012.
Access this resource online
c2012
EBOOKS
5
Mark
Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.
2011
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 G6
8 WEEK LOAN
AVAILABLE
6
Mark
Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 D314 N5
4 WEEK LOAN
AVAILABLE
7
Mark
Computer security handbook
New York : John Wiley & Sons, Inc., 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
HF 5548.37 C7
8 WEEK LOAN
AVAILABLE
8
Mark
Computer security within organisations.
Warwan, Adrian.
Houndmills : Macmillan, 1992.
1992
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 W2
8 WEEK LOAN
AVAILABLE
9
Mark
Research into computer security at Hull University.
Laere, Veerle van.
1991.
1991
THESIS
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Basement b
T/H 1991 M.Sc. L1
UNTIL CLOSING
ASK at the Reading Room
10
Mark
Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, 1991.
1991
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 RUS
4 WEEK LOAN
AVAILABLE
11
Mark
Data and computer security : dictionary of standards concepts and terms
Longley, Dennis.
Basingstoke : Macmillan, 1989.
1989
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 L8
NOT FOR LOAN
LIB USE ONLY
Highly relevant titles entries 12-12
12
Mark
The myths of security : what the computer security industry doesn't want you to know
Viega, John.
Cambridge : O'Reilly, c2009.
c2009
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 VIE
4 WEEK LOAN
AVAILABLE
Very relevant titles entries 13-135
13
Mark
Machine learning safety
Huang, Xiaowei, author.
Singapore : Springer Nature Singapore, 2022.
2022
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
Q 325.5 H8
4 WEEK LOAN
AVAILABLE
14
Mark
Information risk management : a practitioner's guide
Sutton, David (Information security practitioner), author.
Swindon : BCS, [2021]
2021
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
HD30.2 .S8
4 WEEK LOAN
AVAILABLE
15
Mark
Law, policy, and the Internet
Oxford : Hart, 2019.
2019
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
K564.C6 L39
4 WEEK LOAN
AVAILABLE
16
Mark
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018.
Access this resource online
2018
EBOOKS
17
Mark
Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.
2018
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA76.9.A25 D5 2018
4 WEEK LOAN
AVAILABLE
18
Mark
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
Holden, Joshua, 1970- author.
Princeton : Princeton University Press, [2017]
Access this resource online
2017
EBOOKS
19
Mark
Mastering Blockchain / : distributed ledgers, decentralization and smart contracts explained
Bashir, Imran, author.
Birmingham : Packt, 2017.
Access this resource online
2017
EBOOKS
20
Mark
The psychology of information security : resolving conflicts between security compliance and human b
Zinatullin, Leron.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016.
Access this resource online
2016
EBOOKS
21
Mark
Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016.
Access this resource online
2016
EBOOKS
22
Mark
Elementary information security
Smith, Richard E., 1952- author.
Burlington, MA : Jones & Bartlett Learning, [2016]
2016
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 S652 2016
4 WEEK LOAN
AVAILABLE
23
Mark
Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015]
Access this resource online
2015
EBOOKS
24
Mark
Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.
c2014
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 K536 2014
4 WEEK LOAN
AVAILABLE
25
Mark
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in
Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014.
Access this resource online
2014
EBOOKS
26
Mark
Cyber blockades
Russell, Alison Lawlor.
Washington DC : Georgetown University Press, [2014]
Access this resource online
2014
EBOOKS
27
Mark
Cybersecurity and cyberwar : what everyone needs to know
Singer, P. W. (Peter Warren)
Oxford : Oxford University Press, [2014]
2014
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 S6
4 WEEK LOAN
AVAILABLE
BJL Reading Room 1st floor HDC
QA 76.9 A25 S6
4 WEEK LOAN
AVAILABLE
28
Mark
The case for ISO27001 : 2013
Calder, Alan, 1957-
United Kingdom : IT Governance Publishing, 2013.
Access this resource online
2013
EBOOKS
29
Mark
Cyber security for educational leaders : a guide to understanding and implementing technology polici
Phillips, Richard, 1958-
New York : Routledge, 2013.
2013
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
LB 1028.3 P5
8 WEEK LOAN
AVAILABLE
30
Mark
Cybersecurity and cyberwar : what everyone needs to know
Singer, Peter, 1946-
New York ; Oxford : Oxford University Press, 2013.
Access this resource online
2013
EBOOKS
31
Mark
Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013.
Access this resource online
2013
EBOOKS
32
Mark
Underground
Dreyfus, Suelette.
Edinburgh : Canongate, 2012.
2012
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
364.168 DRE
4 WEEK LOAN
AVAILABLE
33
Mark
The revolution will be digitised : dispatches from the information war
Brooke, Heather.
London : Windmill, 2012.
2012
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Leisure reading - mezzanine floor
HM851 .B76 2012
4 WEEK LOAN
AVAILABLE
34
Mark
Wikileaks : news in the networked era
Beckett, Charlie.
Cambridge : Polity Press, 2012.
2012
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 6th Floor
PN 4729.3 B3
8 WEEK LOAN
AVAILABLE
35
Mark
Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.
c2011
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 SCA
4 WEEK LOAN
AVAILABLE
36
Mark
Ghost in the wires : my adventures as the world's most wanted hacker
Mitnick, Kevin D. (Kevin David), 1963-
New York ; London : Little, Brown, 2011.
2011
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
364.168092 MIT
4 WEEK LOAN
AVAILABLE
37
Mark
Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
New York ; London : McGraw-Hill, c2011.
Access this resource online
c2011
EBOOKS
38
Mark
Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.
2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 F3
8 WEEK LOAN
AVAILABLE
39
Mark
Hackers
Levy, Steven.
Farnham : O'Reilly, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
364.168 LEV
4 WEEK LOAN
AVAILABLE
40
Mark
SQL injection attacks and defense
Rockland, Mass. : Syngress, 2009.
2009
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 S7
4 WEEK LOAN
AVAILABLE
41
Mark
Virtual shadows : your privacy in the information society
Öqvist, Karen Lawrence.
Swindon : BCS, c2009.
c2009
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
HM 851 O6
8 WEEK LOAN
AVAILABLE
BJL 5th Floor
HM 851 O6
8 WEEK LOAN
AVAILABLE
42
Mark
Virtual shadows your privacy in the information society
Öqvist, Karen Lawrence.
Swindon : BCS, c2009.
Access this resource online
c2009
EBOOKS
43
Mark
Managing the human factor in information security : how to win over staff and influence business man
Lacey, David.
Chichester : Wiley, c2009.
Access this resource online
c2009
EBOOKS
44
Mark
Introduction to modern cryptography
Katz, Jonathan, 1974-
Boca Raton, Fla. : Chapman & Hall/CRC, c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 K2
8 WEEK LOAN
AVAILABLE
45
Mark
Security engineering : a guide to building dependable distributed systems
Anderson, Ross, 1956-
Indianapolis, Ind. : Wiley, c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 A5
8 WEEK LOAN
AVAILABLE
BJL Reading Room Mezzanine
005.8 AND
4 WEEK LOAN
AVAILABLE
46
Mark
Gray hat hacking : the ethical hacker's handbook
New York ; London : McGraw-Hill, c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 G7
4 WEEK LOAN
AVAILABLE
47
Mark
Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
025.04 LON
4 WEEK LOAN
AVAILABLE
48
Mark
Schneier on security
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2008.
Access this resource online
c2008
EBOOKS
49
Mark
Security engineering a guide to building dependable distributed systems
Anderson, Ross, 1956-
Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008.
Access this resource online
2008
EBOOKS
50
Mark
Internet security : hacking, counterhacking, and society
Sudbury, Mass. ; London : Jones and Bartlett, c2007.
c2007
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.875 I57 I6
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
TK 5105.875 I57 I6
8 WEEK LOAN
AVAILABLE
Result Page
1
2
3
4
Next
(Search History)
KEYWORD: Computer security. in All Libraries
(Clear Search History)
(End Search Session)