Limit search to available items
Result Page   
Save marked records Save all on page
BJL CLASSMARKS (1-50 of 226)
QA76.9.A25
1
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.  
c2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCA  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 A1
2
Mark
  Access denied : the practice and policy of global internet filtering

Cambridge, Mass. : MIT Press, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A1  8 WEEK LOAN  AVAILABLE
3
Mark
  Proceedings of Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, June 3-
ACM Symposium on Access Control Models and Technologies (7th : 2002 : Monterey, Calif.)
New York : Association for Computing Machinery, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 A5
4
Mark
  Security engineering : a guide to building dependable distributed systems
Anderson, Ross, 1956-
Indianapolis, Ind. : Wiley, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 A5  8 WEEK LOAN  AVAILABLE
 BJL Reading Room Mezzanine  005.8 AND  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 B3
5
Mark
  Designing information systems security.
Baskerville, Richard.
Chichester : Wiley, 1988.  
1988
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B3  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B5
6
Mark
  Best truth : intelligence in the Information Age
Berkowitz, Bruce D., 1956-
New Haven, Conn. : Yale University Press, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B5  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B7
7
Mark
  Codes, ciphers, and computers : an introduction to information security.
Bosworth, Bruce.
Rochelle Park, N.J. : Hayden, 1982.  
1982
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B7  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B8
8
Mark
  Data protection : specification for a personal information management system.
British Standards Institution.
London : British Standards Institution, 2009.  
2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  NOT FOR LOAN  LIB USE ONLY
9
Mark
  Evidential weight and legal admissibility of electronic information : specification.
British Standards Institution.
London : British Standards Institution, 2008.  
2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  NOT FOR LOAN  LIB USE ONLY
10
Mark
  Information security management. Part 2 : Specification for information security management systems.
British Standards Institution.
London : BSI, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Pamphlet Collection p  q QA 76.9 A25 B8  8 WEEK LOAN  ASK at the Reading Room
11
Mark
  Information security management systems : part 3 guidelines for information security risk management
British Standards Institution.
London : British Standards Institution, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
12
Mark
  Information technology - code of practice for information security management.
British Standards Institution.
London : BSI, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
13
Mark
  Information technology - security techniques - Code of practice for information security management.
British Standards Institution.
London : British Standards Institution, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
14
Mark
  Information technology - security techniques - information security management systems - requirement
British Standards Institution.
London : British Standards Institution, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  q QA 76.9 A25 B8  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 B9
15
Mark
  Information and secrecy : Vannevar Bush, Ultra, and the other Memex.
Burke, Colin B.
Metuchen, N.J. : Scarecrow Press, 1994.  
1994
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B9  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C1
16
Mark
  Information security handbook
Caelli, William.
Basingstoke : Macmillan, 1991.  
1991
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C6
17
Mark
  Computer fraud
Collier, P. A.
London : Chartered Institute of Management Accountants, 1990.  
1990
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Pamphlet Collection p  QA 76.9 A25 C6  8 WEEK LOAN  ASK at the Reading Room
 BJL 3rd Floor  QA 76.9 A25 C6  8 WEEK LOAN  AVAILABLE
18
Mark
  The prevention and detection of computer fraud
Collier, P.A.
London : Chartered Institute of Management Accountants, 1990.  
1990
BOOK
QA 76.9 A25 C65
19
Mark
  Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteen
Colloquy on European Law (14th : 1984 : Lisbon, Portugal)
Strasbourg : Council of Europe, 1985.  
1985
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 C65  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 C9
20
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM Press, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C9  8 WEEK LOAN  AVAILABLE
QA76.9.A25 D5 2018
21
Mark
  Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.  
2018
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
QA76.9.A25 D8 2017
22
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
QA76.9.A25 E5425 2007
23
Mark
  Engaging privacy and information technology in a digital age

Washington, D.C. : National Academies Press, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 WAL  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 E6
24
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  DUE 13-05-24
QA 76.9 A25 F3
25
Mark
  Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.  
2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 F3  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 G6
26
Mark
  Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.  
2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 G6  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 G7
27
Mark
  Gray hat hacking : the ethical hacker's handbook

New York ; London : McGraw-Hill, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 G7  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 H1
28
Mark
  Cyberpunk : outlaws and hackers on the computer frontier
Hafner, Katie.
London : Corgi, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 H8
29
Mark
  Writing secure code
Howard, Michael, 1965-
Redmond, Wash. : Microsoft Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
Click to view copies/volumes at all libraries
QA 76.9 A25 H9
30
Mark
  Information warfare : corporate attack and defence in a digital world
Hutchinson, William.
Oxford : Butterworth-Heinemann, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H9  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 I6
31
Mark
  IEE proceedings : information security.
Institution of Electrical Engineers.
London : IEE, 2005-2006.  
2006
PERIODICAL
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL basement journals  q QA 76.9 A25 I6  2005/2006,v.152-153  7 DAYS  ASK at the Reading Room
32
Mark
  Information security handbook.
International Computers Limited.
London : ICL, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 I6  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 K2
33
Mark
  Introduction to modern cryptography
Katz, Jonathan, 1974-
Boca Raton, Fla. : Chapman & Hall/CRC, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K2  8 WEEK LOAN  AVAILABLE
QA76.9.A25 K536 2014
34
Mark
  Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.  
c2014
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 K536 2014  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 K8
35
Mark
  The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K8  8 WEEK LOAN  AVAILABLE
QA76.9.A25 L49 2001
36
Mark
  Crypto : secrecy and privacy in the new code war
Levy, Steven.
London : Penguin, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 LEV  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 L8
37
Mark
  Big book of IPsec RFCs
Loshin, Peter.
San Diego, Calif. : Academic Press, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 L8  8 WEEK LOAN  AVAILABLE
38
Mark
  Data and computer security : dictionary of standards concepts and terms
Longley, Dennis.
Basingstoke : Macmillan, 1989.  
1989
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 L8  NOT FOR LOAN  LIB USE ONLY
QA 76.9 A25 M1
39
Mark
  Software security : building security in.
McGraw, Gary, 1966-
Upper Saddle River, N.J. : Addison-Wesley, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 M1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 M1  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 M5
40
Mark
  Cryptography decrypted
Mel, H. X., 1948- author.
Boston, Mass. : Addison-Wesley, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M5  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 M6
41
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
QA 76.9 A25 N4
42
Mark
  .NET security
Bock, Jason.
Berkeley, Calif. : Apress, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 N4  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 N5
43
Mark
  New Security Paradigms Workshop, September 10th-13th, 2001, Cloudcroft, N.M. : proceedings.
New Security Paradigms Workshop (10th : 2001 : Cloudcroft, New Mexico)
New York : Association for Computing Machinery, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 N5  8 WEEK LOAN  AVAILABLE
44
Mark
  New Security Paradigms Workshop, September 22-25, 1998, Charlottsville, Va. : proceedings.
New Security Paradigms Workshop (7th : 1998 : Charlottsville)
New York : Association for Computing Machinery, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 N5  8 WEEK LOAN  AVAILABLE
45
Mark
  New Security Paradigms Workshop, September 23-26, 1997, Langdale, Cumbria : proceedings.
New Security Paradigms Workshop (6th : 1997 : Langdale)
New York : Association for Computing Machinery, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q QA 76.9 A25 N5  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 P3
46
Mark
  Information security risk analysis
Peltier, Thomas R.
London : Auerbach, c2001.  
c2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 P3  4 WEEK LOAN  AVAILABLE
QA76.9.A25 P33 2010
47
Mark
  Understanding cryptography a textbook for students and practitioners
Paar, Christof, 1963- author.
Berlin : Springer, [2010] -Access this resource online
2010
EBOOKS
QA 76.9 A25 P9
48
Mark
  The protection of computer software : its technology and applications

Cambridge : Cambridge University Press, 1989.  
1989
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 P9  8 WEEK LOAN  AVAILABLE
QA 76.9 A25 S3
49
Mark
  Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
50
Mark
  Cryptography and public key infrastructure on the internet
Schmeh, Klaus, author.
Chichester : Wiley, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S3  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results
Result Page