Limit search to available items
Nearby BJL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Year Entries
QA 76.9 A23 H3   2
QA 76.9 A23 R2   2
QA 76.9 A23 T4 : Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emms.; BJL  1988 1
QA76.9.A25 : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; BJL  c2011 1
QA 76.9 A25 A1   2
QA 76.9 A25 A5 : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.; BJL  c2008 1
QA 76.9 A25 B3 : Designing information systems security.; BJL  1988 1
QA 76.9 A25 B5 : Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman.; BJL  c2000 1
QA 76.9 A25 B7 : Codes, ciphers, and computers : an introduction to information security.; BJL  1982 1
QA 76.9 A25 B8   7
QA 76.9 A25 B9 : Information and secrecy : Vannevar Bush, Ultra, and the other Memex.; BJL  1994 1
QA 76.9 A25 C1 : Information security handbook / William Caelli, Dennis Longley, Michael Shain.; BJL  1991 1
QA 76.9 A25 C6   2
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL  1985 1
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL  c2003 1
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL  2018 1
QA76.9.A25 D8 2017 : Computer security : a hands-on approach / Wenliang Du.; BJL  2017 1
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL  c2007 1
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL  2007 1
QA 76.9 A25 F3 : Cryptography engineering : design principles and practical applications.; BJL  2010 1
QA 76.9 A25 G6 : Computer security / Dieter Gollmann.; BJL  2011 1
QA 76.9 A25 G7 : Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].; BJL  c2008 1
QA 76.9 A25 H1 : Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.; BJL  1993 1
QA 76.9 A25 H8 : Writing secure code / Michael Howard and David LeBlanc.; BJL  2003 1
QA 76.9 A25 H9 : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren.; BJL  2001 1
QA 76.9 A25 I6   2
QA 76.9 A25 K2 : Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.; BJL  c2008 1
QA76.9.A25 K536 2014 : Fundamentals of information systems security / David Kim and Michael G. Solomon.; BJL  c2014 1
QA 76.9 A25 K8 : The crypto controversy : a key conflict in the Information Society.; BJL  1999 1
QA76.9.A25 L49 2001 : Crypto : secrecy and privacy in the new code war / Steven Levy.; BJL  c2000 1
QA 76.9 A25 L8   2
QA 76.9 A25 M1 : Software security : building security in.; BJL  c2006 1
QA 76.9 A25 M5 : Cryptography decrypted / H.X. Mel, Doris M. Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.; BJL  2001 1
QA 76.9 A25 M6 : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon ; foreword by Steve Wozniak.; BJL  2003 1
QA 76.9 A25 N4 : .NET security / Jason Bock ... [et al.].; BJL  2002 1
QA 76.9 A25 N5   3
QA 76.9 A25 P3 : Information security risk analysis / Thomas R. Peltier.; BJL  c2001 1
QA76.9.A25 P33 2010 : Understanding cryptography [electronic resource] : a textbook for students and practitioners / Christof Paar, Jan Pelzl ; foreword by Bart Preneel.; Online materials  2010 1
QA 76.9 A25 P9 : The protection of computer software : its technology and applications / edited by D. Grover.; BJL  1989 1
QA 76.9 A25 S3   3
QA 76.9 A25 S4   2
QA 76.9 A25 S5   2
QA 76.9 A25 S6 : Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman.; BJL  2014 1
QA76.9.A25 S652 2016 : Elementary information security / Richard E. Smith.; BJL  2016 1
QA 76.9 A25 S7   2
QA76.9.A25 S73 2015 : Computer security : principles and practice / William Stallings, Lawrie Brown.; BJL  2015 1
QA 76.9 A25 T2 : Technology and privacy : the new landscape / edited by Philip E. Agre and Marc Rotenberg.; BJL  1997 1
QA 76.9 A25 U5 : The 'Orange Book' series.; BJL  1990 1
QA 76.9 A25 V1 : Computer forensics : computer crime scene investigation / John Vacca.; BJL  2002 1
QA76.9.A25 V55 2009 : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; BJL  c2009 1
Save marked records Save all on page
Result Page   Prev Next