Limit search to available items
Nearby KDL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Year Entries
005.74 Bey : Database systems / Paul Beynon-Davies.; Beynon-Davies, Paul.  2004 1
005.74 Dev : Data warehouse : from architecture to implementation.; Devlin, Barry.  1997 1
005.74 Rob   5
005.7565 Jen   2
005.8 And   3
005.8 Bar   2
005.8 Bla : Internet security protocols : protecting IP traffic.; Black, Uyless.  2000 1
005.8 Cha : Building internet firewalls.; Chapman, D Brent.  1995 1
005.8 Che : Firewalls and internet security : repelling the Wily Hacker.; Cheswick, William R.  1999 1
005.8 Chi   2
005.8 Cor : Web security.; Cormack, Andrew.  1997 1
005.8 Den : Information warfare and security.; Denning, Dorothy Elizabeth Robling,  1999 1
005.8 Dep : Information security and the internet.; Great Britain.  1999 1
005.8 Dwi : Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.; Dwivedi, Himanshu.  c2004 1
005.8 Fry : Security monitoring / Chris Fry and Martin Nystrom.; Fry, Chris.  c2009 1
005.8 Har : Mastering Web services security / Bret Hartman...[et al].  2003 1
005.8 Kee : Electronic commerce relationships : trust by design / Peter Keen ... [et al.].  2000 1
005.8 Kru : Security+ prep guide.; Krutz, Ronald L.  2003 1
005.8 Lev : Crypto : secrecy and privacy in the new code war / Steven Levy.; Levy, Steven.  c2000 1
005.8 Lin : Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.; Lindskog, Helena.  2003 1
005.8 Man : Incident response & computer forensics / Chris Prosise, Kevin Mandia.; Prosise, Chris.  2003 1
005.8 Mcc : Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz.; McClure, Stuart.  1999 1
005.8 Mcn : Network security assessment / Chris McNab.; McNab, Chris  c2004 1
005.8 Men   2
005.8 Mit   2
005.8 New : Computer security : protecting digital resources / Robert C. Newman.; Newman, Robert C.  c2010 1
005.8 Oak : Java security.; Oaks, Scott.  1998 1
005.8 Ogl : Practical firewalls.; Ogletree, Terry.  2000 1
005.8 Rus : Computer security basics / Deborah Russell and G.T. Gangemi, Sr.; Russell, Deborah.  1991 1
005.8 Sca : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; Scambray, Joel.  c2011 1
005.8 Sch : Building open source network security tools : components and techniques.; Schiffman, Mike D.  2002 1
005.8 Spe : The personal internet security guidebook : keeping hackers and crackers out of your home.; Speed, Tim.  2002 1
005.8 Tox : Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.; Toxen, Bob.  c2003 1
005.8 Vie : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; Viega, John.  c2009 1
005.8 Wal : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.  c2007 1
005.82 Gar : PGP : Pretty Good Privacy.; Garfinkel, Simson.  1995 1
005.82 Knu : Java cryptography.; Knudsen, Jonathan.  1998 1
005.82 Mel : Cryptography decrypted / H.X. Mel and Doris M. Baker.; Mel, H. X.,  2001 1
005.82 Sch : Cryptography and public key infrastructure on the internet / Klaus Schmeh.; Schmeh, Klaus.  c2003 1
005.84 Bow : Worm : the first digital world war / Mark Bowden.; Bowden, Mark,  c2011 1
005.84 Gri : Malicious mobile code : virus protection for Windows.; Grimes, Roger A.  2001 1
005.84 Sch : Securing the network from malicious code : a complete guide to defending against - viruses, worms and trojans / Douglas Schweitzer.; Schweitzer, Douglas.  2002 1
006.3 Big : Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus.; Bigus, Joseph P.  2001 1
006.3 Bri : Building a digital human / Ken Brilliant.; Brilliant, Ken.  c2003 1
006.3 Cai : Digital human modeling : trends in human algorithms / Yang Cai (ed.).  c2008 1
006.3 Din : Understanding agent systems / Mark d'Inverno, Michael Luck.; D'Inverno, Mark.  c2004 1
006.3 Ear : Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.).  2002 1
006.3 Evo : Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conference, EvoBIO 2010, Istanbul, Turkey, April 7-9, 2010, proceedings / Clara Pizzuti, Marylyn D. Ritchie, Mario Giacobini (eds.).; EvoBIO 2010  c2010 1
006.3 Hay : My mother was a computer : digital subjects and literary texts / N. Katherine Hayles.; Hayles, N. Katherine.  2005 1
006.3 Jai : Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, editors.  c2002 1
Save marked records Save all on page
Result Page   Prev Next