Limit search to available items
Nearby KDL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Media Year
005.8 Bla : Internet security protocols : protecting IP traffic.; Black, Uyless.     
      Internet security protocols : protecting IP traffic. BJL; 005.8 BLA   BOOK 2000
005.8 Cha : Building internet firewalls.; Chapman, D Brent.     
      Building internet firewalls. BJL; 005.8 CHA   BOOK 1995
005.8 Che : Firewalls and internet security : repelling the Wily Hacker.; Cheswick, William R.     
      Firewalls and internet security : repelling the Wily Hacker. BJL; 005.8 CHE   BOOK 1999
005.8 Chi    
      Hack attacks revealed : a complete reference with custom security hacking toolkit. BJL; 005.8 CHI   BOOK 2002
      Implementing biometric security / John Chirillo, Scott Blaul. BJL; 005.8 CHI   BOOK 2003
005.8 Cor : Web security.; Cormack, Andrew.     
      Web security. BJL; OS 005.8 COR   BOOK 1997
005.8 Dep : Information security and the internet.; Great Britain.     
      Information security and the internet. BJL; OS 005.8 DEP   BOOK 1999
005.8 Dwi : Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.; Dwivedi, Himanshu.     
      Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi. BJL; 005.8 DWI   BOOK c2004
005.8 Fry : Security monitoring / Chris Fry and Martin Nystrom.; Fry, Chris.     
      Security monitoring / Chris Fry and Martin Nystrom. BJL; TK5105.59 .F79 2009   BOOK c2009
005.8 Har : Mastering Web services security / Bret Hartman...[et al].     
      Mastering Web services security / Bret Hartman...[et al]. BJL; 005.8 HAR   BOOK 2003
005.8 Kee : Electronic commerce relationships : trust by design / Peter Keen ... [et al.].     
      Electronic commerce relationships : trust by design / Peter Keen ... [et al.]. BJL; 005.8 KEE   BOOK 2000
005.8 Kru : Security+ prep guide.; Krutz, Ronald L.     
      Security+ prep guide. BJL; 005.8 KRU   BOOK 2003
005.8 Lev : Crypto : secrecy and privacy in the new code war / Steven Levy.; Levy, Steven.     
      Crypto : secrecy and privacy in the new code war / Steven Levy. BJL; QA76.9.A25 L49 2001   BOOK c2000
005.8 Lin : Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.; Lindskog, Helena.     
      Web site privacy with P3P / Helena Lindskog and Stefan Lindskog. BJL; 005.8 LIN   BOOK 2003
005.8 Man : Incident response & computer forensics / Chris Prosise, Kevin Mandia.; Prosise, Chris.     
      Incident response & computer forensics / Chris Prosise, Kevin Mandia. BJL; 005.8 MAN   BOOK 2003
005.8 Mcc : Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz.; McClure, Stuart.     
      Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George K BJL; 005.8 MCC   BOOK 1999
005.8 Mcn : Network security assessment / Chris McNab.; McNab, Chris     
      Network security assessment / Chris McNab. BJL; 005.8 MCN   BOOK c2004
005.8 Men    
      Investigative data mining for security and criminal detection / Jesús Mena. BJL; QA76.9.D343   BOOK 2003
      Investigative data mining for security and criminal detection / Jesús Mena. BJL; QA76.9.D343   BOOK 2003
005.8 Oak : Java security.; Oaks, Scott.     
      Java security. BJL; 005.8 OAK   BOOK 1998
005.8 Ogl : Practical firewalls.; Ogletree, Terry.     
      Practical firewalls. BJL; 005.8 OGL   BOOK 2000
005.8 Rus : Computer security basics / Deborah Russell and G.T. Gangemi, Sr.; Russell, Deborah.     
      Computer security basics / Deborah Russell and G.T. Gangemi, Sr. BJL; 005.8 RUS   BOOK 1991
005.8 Sca : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; Scambray, Joel.     
      Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, V BJL; QA76.9.A25   BOOK c2011
005.8 Sch : Building open source network security tools : components and techniques.; Schiffman, Mike D.     
      Building open source network security tools : components and techniques. BJL; 005.8 SCH   BOOK 2002
005.8 Spe : The personal internet security guidebook : keeping hackers and crackers out of your home.; Speed, Tim.     
      The personal internet security guidebook : keeping hackers and crackers out of your home. BJL; 005.8 SPE   BOOK 2002
005.8 Tox : Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.; Toxen, Bob.     
      Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen. BJL; QA76.76.O63   BOOK c2003
005.8 Vie : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; Viega, John.     
      The myths of security : what the computer security industry doesn't want you to know / by John Viega. BJL; QA76.9.A25 V55 2009   BOOK c2009
005.8 Wal : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.     
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet BJL; QA76.9.A25 E5425 2007   BOOK c2007
005.82 Gar : PGP : Pretty Good Privacy.; Garfinkel, Simson.     
      PGP : Pretty Good Privacy. BJL; 005.82 GAR   BOOK 1995
005.82 Knu : Java cryptography.; Knudsen, Jonathan.     
      Java cryptography. BJL; 005.82 KNU   BOOK 1998
005.84 Bow : Worm : the first digital world war / Mark Bowden.; Bowden, Mark,     
      Worm : the first digital world war / Mark Bowden. BJL; QA76.76.C68 B6 2011   BOOK c2011
005.84 Gri : Malicious mobile code : virus protection for Windows.; Grimes, Roger A.     
      Malicious mobile code : virus protection for Windows. BJL; 005.84 GRI   BOOK 2001
006.3 Big : Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus.; Bigus, Joseph P.     
      Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus. BJL; 006.3 BIG   BOOK 2001
006.3 Bri : Building a digital human / Ken Brilliant.; Brilliant, Ken.     
      Building a digital human / Ken Brilliant. BJL; TJ211   BOOK c2003
006.3 Cai : Digital human modeling : trends in human algorithms / Yang Cai (ed.).     
      Digital human modeling : trends in human algorithms / Yang Cai (ed.). BJL; QA76.9.C65 D535 2008   BOOK c2008
006.3 Din : Understanding agent systems / Mark d'Inverno, Michael Luck.; D'Inverno, Mark.     
      Understanding agent systems / Mark d'Inverno, Michael Luck. BJL; QA76.76.I58 D56 2003   BOOK c2004
006.3 Ear : Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.).     
      Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.). BJL; 006.3 EAR   BOOK 2002
006.3 Evo : Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conference, EvoBIO 2010, Istanbul, Turkey, April 7-9, 2010, proceedings / Clara Pizzuti, Marylyn D. Ritchie, Mario Giacobini (eds.).; EvoBIO 2010     
      Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conferenc BJL; QA76.618   BOOK c2010
006.3 Hay : My mother was a computer : digital subjects and literary texts / N. Katherine Hayles.; Hayles, N. Katherine.     
      My mother was a computer : digital subjects and literary texts / N. Katherine Hayles. BJL; Q342   BOOK 2005
006.3 Jai : Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, editors.     
      Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, edito BJL; QA76.76.I58 I574 2002   BOOK c2002
006.3 Klu : Intelligent information agents : the AgentLink perspective / Matthias Klusch ... [et al.] (eds.).     
      Intelligent information agents : the AgentLink perspective / Matthias Klusch ... [et al.] (eds.). BJL; 006.3 KLU   BOOK c2003
006.3 Liu : Autonomous agents and multi-agent systems : explorations in learning, self-organization and adaptive computation / Jiming Liu.; Liu, Jiming.     
      Autonomous agents and multi-agent systems : explorations in learning, self-organization and adaptive BJL; 006.3 LIU   BOOK c2001
006.3 Neg : Artificial intelligence : a guide to intelligent systems / Michael Negnevitsky.; Negnevitsky, Michael.     
      Artificial intelligence : a guide to intelligent systems / Michael Negnevitsky. BJL; QA76.76.E95 .N44 2005   BOOK 2005
006.3 Pep : The post-human condition.; Pepperell, Robert.     
      The post-human condition. BJL; 006.3 PEP   BOOK 1997
006.3 Rut : From brows to trust : evaluating embodied conversational agents / edited by Zsofia Ruttkay and Catherine Pelachaud.     
      From brows to trust : evaluating embodied conversational agents / edited by Zsofia Ruttkay and Cather BJL; 006.3 RUT   BOOK c2004
006.3 Shi : Turing test : verbal behavior as the hallmark of intelligence / edited by Stuart M. Shieber.     
      Turing test : verbal behavior as the hallmark of intelligence / edited by Stuart M. Shieber. BJL; Q341   BOOK c2004
006.3 Sto : Layered learning in multiagent systems : a winning approach to robotic soccer.; Stone, Peter,     
      Layered learning in multiagent systems : a winning approach to robotic soccer. BJL; 006.3 STO   BOOK 2000
006.3 Sug : Intelligent support systems : knowledge management.     
      Intelligent support systems : knowledge management. BJL; 006.3 SUG   BOOK c2002
006.3 Vaz : The role of norms and electronic institutions in multi-agent systems : the HarmonIA framework / Javier Vasquez-Salceda.; Vazquez-Salceda, Javier.     
      The role of norms and electronic institutions in multi-agent systems : the HarmonIA framework / Javie BJL; 006.3 VAZ   BOOK c2004
006.3014 Jor : Signs, search and communication : semiotic aspects of artificial intelligence / edited by Rene J. Jorna, Barend van Heusden, Roland Posner.     
      Signs, search and communication : semiotic aspects of artificial intelligence / edited by Rene J. Jor BJL; P99   BOOK 1993
006.312 Jan : Data analysis with open source tools / Philipp K. Janert.; Janert, Philipp K.     
      Data analysis with open source tools / Philipp K. Janert. BJL; QA76.9.D343   BOOK c2011
006.312 Rus : Mining the social web / Matthew A. Russell.; Russell, Matthew A.,     
      Mining the social web / Matthew A. Russell. BJL; QA76.9.D343   BOOK c2011
Save marked records Save all on page
Result Page   Prev Next