Limit search to available items
Nearby BJL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Media Year
QA 76.9 A23 R2    
      Recent trends in data type specification : 7th Workshop on specification of abstract data types, Wust BJL  BOOK 1991
      Recent trends in data type specifications : 5th workshop on specification of Abstract Data Types, Gul BJL  BOOK 1988
QA 76.9 A23 T4 : Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emms.; BJL     
      Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emm BJL  BOOK 1988
QA76.9.A25    
      Computers & security [electronic resource]. Online materials  EJOURNALS 1982-
      Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, V BJL  BOOK c2011
      I-ways [electronic resource]. Online materials  EJOURNALS  
      Security informatics [electronic resource]. Online materials  EJOURNALS 2012
QA 76.9 A25 A1    
      Access denied : the practice and policy of global internet filtering / edited by Ronald Deibert ... [ BJL  BOOK c2008
      Proceedings of Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, June 3-4 BJL  BOOK 2002
QA 76.9 A25 A5 : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.; BJL     
      Security engineering : a guide to building dependable distributed systems / Ross J. Anderson. BJL  BOOK c2008
QA 76.9 A25 B3 : Designing information systems security.; BJL     
      Designing information systems security. BJL  BOOK 1988
QA 76.9 A25 B5 : Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman.; BJL     
      Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman. BJL  BOOK c2000
QA 76.9 A25 B7 : Codes, ciphers, and computers : an introduction to information security.; BJL     
      Codes, ciphers, and computers : an introduction to information security. BJL  BOOK 1982
QA 76.9 A25 B8    
      Data protection : specification for a personal information management system. BJL  BOOK 2009
      Evidential weight and legal admissibility of electronic information : specification. BJL  BOOK 2008
      Information security management. Part 2 : Specification for information security management systems. BJL  BOOK 1999
      Information security management systems : part 3 guidelines for information security risk management. BJL  BOOK 2006
3 additional entries    
QA 76.9 A25 B9 : Information and secrecy : Vannevar Bush, Ultra, and the other Memex.; BJL     
      Information and secrecy : Vannevar Bush, Ultra, and the other Memex. BJL  BOOK 1994
QA 76.9 A25 C1 : Information security handbook / William Caelli, Dennis Longley, Michael Shain.; BJL     
      Information security handbook / William Caelli, Dennis Longley, Michael Shain. BJL  BOOK 1991
QA 76.9 A25 C6    
      Computer fraud / by P.A. Collier, R. Dixon, C.L. Marston. BJL  BOOK 1990
      The prevention and detection of computer fraud / P.A. Collier, R. Dixon, C.L. Marston. BJL  BOOK 1990
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL     
      Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteent BJL  BOOK 1985
QA76.9.A25 C8225 : Cryptography and communications (Online); Online materials     
      Cryptography and communications [electronic resource] : discrete structures, Boolean functions and se Online materials  EJOURNALS 2009-
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL     
      Current security management & ethical issues of information technology / edited by Rasool Azari. BJL  BOOK c2003
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL     
      Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team t BJL  BOOK 2018
QA76.9.A25 D8 2017 : Computer security : a hands-on approach / Wenliang Du.; BJL     
      Computer security : a hands-on approach / Wenliang Du. BJL  BOOK 2017
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL     
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet BJL  BOOK c2007
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL     
      Hacking : the art of exploitation / Jon Erickson. BJL  BOOK 2007
QA 76.9 A25 F3 : Cryptography engineering : design principles and practical applications.; BJL     
      Cryptography engineering : design principles and practical applications. BJL  BOOK 2010
QA 76.9 A25 G6 : Computer security / Dieter Gollmann.; BJL     
      Computer security / Dieter Gollmann. BJL  BOOK 2011
QA 76.9 A25 G7 : Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].; BJL     
      Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.]. BJL  BOOK c2008
QA 76.9 A25 H1 : Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.; BJL     
      Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff. BJL  BOOK 1993
QA 76.9 A25 H8 : Writing secure code / Michael Howard and David LeBlanc.; BJL     
      Writing secure code / Michael Howard and David LeBlanc. BJL  BOOK 2003
QA 76.9 A25 H9 : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren.; BJL     
      Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren. BJL  BOOK 2001
QA76.9.A25 I347 : IEEE security & privacy (Online); Online materials     
      IEEE security & privacy [electronic resource]. Online materials  EJOURNALS  
QA76.9.A25 I54155    
      Information security technical report [electronic resource]. Online materials  EJOURNALS 2013
      Journal of information security and applications [electronic resource]. Online materials  EJOURNALS  
QA 76.9 A25 I6    
      IEE proceedings : information security. BJL  PERIODICAL 2006
      Information security handbook. BJL  BOOK 1993
QA 76.9 A25 K2 : Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.; BJL     
      Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell. BJL  BOOK c2008
QA76.9.A25 K536 2014 : Fundamentals of information systems security / David Kim and Michael G. Solomon.; BJL     
      Fundamentals of information systems security / David Kim and Michael G. Solomon. BJL  BOOK c2014
QA 76.9 A25 K8 : The crypto controversy : a key conflict in the Information Society.; BJL     
      The crypto controversy : a key conflict in the Information Society. BJL  BOOK 1999
QA76.9.A25 L49 2001 : Crypto : secrecy and privacy in the new code war / Steven Levy.; BJL     
      Crypto : secrecy and privacy in the new code war / Steven Levy. BJL  BOOK c2000
QA 76.9 A25 L8    
      Big book of IPsec RFCs / compiled by Pete Loshin. BJL  BOOK 2000
      Data and computer security : dictionary of standards concepts and terms / Dennis Longley, Michael Sha BJL  BOOK 1989
QA 76.9 A25 M1 : Software security : building security in.; BJL     
      Software security : building security in. BJL  BOOK c2006
QA 76.9 A25 N4 : .NET security / Jason Bock ... [et al.].; BJL     
      .NET security / Jason Bock ... [et al.]. BJL  BOOK 2002
QA 76.9 A25 N5    
      New Security Paradigms Workshop, September 10th-13th, 2001, Cloudcroft, N.M. : proceedings. BJL  BOOK 2001
      New Security Paradigms Workshop, September 22-25, 1998, Charlottsville, Va. : proceedings. BJL  BOOK 1999
      New Security Paradigms Workshop, September 23-26, 1997, Langdale, Cumbria : proceedings. BJL  BOOK 1998
QA 76.9 A25 P3 : Information security risk analysis / Thomas R. Peltier.; BJL     
      Information security risk analysis / Thomas R. Peltier. BJL  BOOK c2001
QA 76.9 A25 P9 : The protection of computer software : its technology and applications / edited by D. Grover.; BJL     
      The protection of computer software : its technology and applications / edited by D. Grover. BJL  BOOK 1989
QA 76.9 A25 S3    
      Applied cryptography : protocols, algorithms, and source code in C. BJL  BOOK 1996
      Secrets and lies : digital security in a networked world. BJL  BOOK 2000
QA 76.9 A25 S4    
      The secure online business : a practical guide to risk management and business continuity / consultan BJL  BOOK c2006
      Security of information and data / T. Daler ... [et al.]. BJL  BOOK 1989
QA76.9.A25 S4353 : Security informatics [electronic resource].; Online materials     
      Security informatics [electronic resource]. Online materials  EJOURNALS 2012
QA 76.9 A25 S5    
      Evidential weight and legal admissibility of information stored electronically : code of practice for BJL  BOOK 2008
      Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder ; Ed Tittel, technic BJL  BOOK c2002
QA 76.9 A25 S6 : Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman.; BJL     
      Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. BJL  BOOK 2014
QA76.9.A25 S652 2016 : Elementary information security / Richard E. Smith.; BJL     
      Elementary information security / Richard E. Smith. BJL  BOOK 2016
QA 76.9 A25 S7    
      Information security : principles and practice / Mark Stamp. BJL  BOOK c2006
      SQL injection attacks and defense / Justin Clarke, lead author and technical editor ; [contributing a BJL  BOOK 2009
QA76.9.A25 S73 2015 : Computer security : principles and practice / William Stallings, Lawrie Brown.; BJL     
      Computer security : principles and practice / William Stallings, Lawrie Brown. BJL  BOOK 2015
QA 76.9 A25 T2 : Technology and privacy : the new landscape / edited by Philip E. Agre and Marc Rotenberg.; BJL     
      Technology and privacy : the new landscape / edited by Philip E. Agre and Marc Rotenberg. BJL  BOOK 1997
QA 76.9 A25 U5 : The 'Orange Book' series.; BJL     
      The 'Orange Book' series. BJL  BOOK 1990
QA 76.9 A25 V1 : Computer forensics : computer crime scene investigation / John Vacca.; BJL     
      Computer forensics : computer crime scene investigation / John Vacca. BJL  BOOK 2002
QA76.9.A25 V55 2009 : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; BJL     
      The myths of security : what the computer security industry doesn't want you to know / by John Viega. BJL  BOOK c2009
Save marked records Save all on page
Result Page   Prev Next