Limit search to available items
196 results found. Sorted by relevance | date | title .
Result Page   
Save marked records Save all on page
KEYWORDS (1-50 of 196)
 Most relevant titles entries 1-11
1
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
2
Mark
  Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]  
2015
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S73 2015  4 WEEK LOAN  AVAILABLE
3
Mark
  Computer security : principles and practice
Stallings, William.
Boston : Pearson, [2015] -Access this resource online
2015
EBOOKS
4
Mark
  Principles of computer security CompTIA security+ and beyond (exam SY0-301)

New York : McGraw-Hill, c2012. -Access this resource online
c2012
EBOOKS
5
Mark
  Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.  
2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 G6  8 WEEK LOAN  AVAILABLE
6
Mark
  Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 D314 N5  4 WEEK LOAN  AVAILABLE
7
Mark
  Computer security handbook

New York : John Wiley & Sons, Inc., 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HF 5548.37 C7  8 WEEK LOAN  AVAILABLE
8
Mark
  Computer security within organisations.
Warwan, Adrian.
Houndmills : Macmillan, 1992.  
1992
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 W2  8 WEEK LOAN  AVAILABLE
9
Mark
  Research into computer security at Hull University.
Laere, Veerle van.
1991.  
1991
THESIS
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Basement b  T/H 1991 M.Sc. L1  UNTIL CLOSING  ASK at the Reading Room
10
Mark
  Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, 1991.  
1991
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 RUS  4 WEEK LOAN  AVAILABLE
11
Mark
  Data and computer security : dictionary of standards concepts and terms
Longley, Dennis.
Basingstoke : Macmillan, 1989.  
1989
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 L8  NOT FOR LOAN  LIB USE ONLY
 Highly relevant titles entries 12-12
12
Mark
  The myths of security : what the computer security industry doesn't want you to know
Viega, John.
Cambridge : O'Reilly, c2009.  
c2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 VIE  4 WEEK LOAN  AVAILABLE
 Very relevant titles entries 13-135
13
Mark
  Machine learning safety
Huang, Xiaowei, author.
Singapore : Springer Nature Singapore, 2022.  
2022
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  Q 325.5 H8  4 WEEK LOAN  AVAILABLE
14
Mark
  Information risk management : a practitioner's guide
Sutton, David (Information security practitioner), author.
Swindon : BCS, [2021]  
2021
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HD30.2 .S8  4 WEEK LOAN  AVAILABLE
15
Mark
  Law, policy, and the Internet

Oxford : Hart, 2019.  
2019
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  K564.C6 L39  4 WEEK LOAN  AVAILABLE
16
Mark
  Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018. -Access this resource online
2018
EBOOKS
17
Mark
  Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.  
2018
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
18
Mark
  The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
Holden, Joshua, 1970- author.
Princeton : Princeton University Press, [2017] -Access this resource online
2017
EBOOKS
19
Mark
  Mastering Blockchain / : distributed ledgers, decentralization and smart contracts explained
Bashir, Imran, author.
Birmingham : Packt, 2017. -Access this resource online
2017
EBOOKS
20
Mark
  The psychology of information security : resolving conflicts between security compliance and human b
Zinatullin, Leron.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016. -Access this resource online
2016
EBOOKS
21
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016. -Access this resource online
2016
EBOOKS
22
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, MA : Jones & Bartlett Learning, [2016]  
2016
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S652 2016  4 WEEK LOAN  AVAILABLE
23
Mark
  Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015] -Access this resource online
2015
EBOOKS
24
Mark
  Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.  
c2014
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 K536 2014  4 WEEK LOAN  AVAILABLE
25
Mark
  CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in
Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014. -Access this resource online
2014
EBOOKS
26
Mark
  Cyber blockades
Russell, Alison Lawlor.
Washington DC : Georgetown University Press, [2014] -Access this resource online
2014
EBOOKS
27
Mark
  Cybersecurity and cyberwar : what everyone needs to know
Singer, P. W. (Peter Warren)
Oxford : Oxford University Press, [2014]  
2014
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S6  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S6  4 WEEK LOAN  AVAILABLE
28
Mark
  The case for ISO27001 : 2013
Calder, Alan, 1957-
United Kingdom : IT Governance Publishing, 2013. -Access this resource online
2013
EBOOKS
29
Mark
  Cyber security for educational leaders : a guide to understanding and implementing technology polici
Phillips, Richard, 1958-
New York : Routledge, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  LB 1028.3 P5  8 WEEK LOAN  AVAILABLE
30
Mark
  Cybersecurity and cyberwar : what everyone needs to know
Singer, Peter, 1946-
New York ; Oxford : Oxford University Press, 2013. -Access this resource online
2013
EBOOKS
31
Mark
  Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013. -Access this resource online
2013
EBOOKS
32
Mark
  Underground
Dreyfus, Suelette.
Edinburgh : Canongate, 2012.  
2012
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168 DRE  4 WEEK LOAN  AVAILABLE
33
Mark
  The revolution will be digitised : dispatches from the information war
Brooke, Heather.
London : Windmill, 2012.  
2012
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Leisure reading - mezzanine floor  HM851 .B76 2012  4 WEEK LOAN  AVAILABLE
34
Mark
  Wikileaks : news in the networked era
Beckett, Charlie.
Cambridge : Polity Press, 2012.  
2012
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 6th Floor  PN 4729.3 B3  8 WEEK LOAN  AVAILABLE
35
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.  
c2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCA  4 WEEK LOAN  AVAILABLE
36
Mark
  Ghost in the wires : my adventures as the world's most wanted hacker
Mitnick, Kevin D. (Kevin David), 1963-
New York ; London : Little, Brown, 2011.  
2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168092 MIT  4 WEEK LOAN  AVAILABLE
37
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
New York ; London : McGraw-Hill, c2011. -Access this resource online
c2011
EBOOKS
38
Mark
  Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.  
2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 F3  8 WEEK LOAN  AVAILABLE
39
Mark
  Hackers
Levy, Steven.
Farnham : O'Reilly, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168 LEV  4 WEEK LOAN  AVAILABLE
40
Mark
  SQL injection attacks and defense

Rockland, Mass. : Syngress, 2009.  
2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S7  4 WEEK LOAN  AVAILABLE
41
Mark
  Virtual shadows : your privacy in the information society
Öqvist, Karen Lawrence.
Swindon : BCS, c2009.  
c2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HM 851 O6  8 WEEK LOAN  AVAILABLE
 BJL 5th Floor  HM 851 O6  8 WEEK LOAN  AVAILABLE
42
Mark
  Virtual shadows your privacy in the information society
Öqvist, Karen Lawrence.
Swindon : BCS, c2009. -Access this resource online
c2009
EBOOKS
43
Mark
  Managing the human factor in information security : how to win over staff and influence business man
Lacey, David.
Chichester : Wiley, c2009. -Access this resource online
c2009
EBOOKS
44
Mark
  Introduction to modern cryptography
Katz, Jonathan, 1974-
Boca Raton, Fla. : Chapman & Hall/CRC, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K2  8 WEEK LOAN  AVAILABLE
45
Mark
  Security engineering : a guide to building dependable distributed systems
Anderson, Ross, 1956-
Indianapolis, Ind. : Wiley, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A5  8 WEEK LOAN  AVAILABLE
 BJL Reading Room Mezzanine  005.8 AND  4 WEEK LOAN  AVAILABLE
46
Mark
  Gray hat hacking : the ethical hacker's handbook

New York ; London : McGraw-Hill, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 G7  4 WEEK LOAN  AVAILABLE
47
Mark
  Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  025.04 LON  4 WEEK LOAN  AVAILABLE
48
Mark
  Schneier on security
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2008. -Access this resource online
c2008
EBOOKS
49
Mark
  Security engineering a guide to building dependable distributed systems
Anderson, Ross, 1956-
Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008. -Access this resource online
2008
EBOOKS
50
Mark
  Internet security : hacking, counterhacking, and society

Sudbury, Mass. ; London : Jones and Bartlett, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.875 I57 I6  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  TK 5105.875 I57 I6  8 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results
Result Page