005.8 Bla : Internet security protocols : protecting IP traffic.; Black, Uyless.
Internet security protocols : protecting IP traffic.
BJL ; 005.8 BLA
BOOK
2000
005.8 Cha : Building internet firewalls.; Chapman, D Brent.
Building internet firewalls.
BJL ; 005.8 CHA
BOOK
1995
005.8 Che : Firewalls and internet security : repelling the Wily Hacker.; Cheswick, William R.
Firewalls and internet security : repelling the Wily Hacker.
BJL ; 005.8 CHE
BOOK
1999
005.8 Chi
Hack attacks revealed : a complete reference with custom security hacking toolkit.
BJL ; 005.8 CHI
BOOK
2002
Implementing biometric security / John Chirillo, Scott Blaul.
BJL ; 005.8 CHI
BOOK
2003
005.8 Cor : Web security.; Cormack, Andrew.
Web security.
BJL ; OS 005.8 COR
BOOK
1997
005.8 Dep : Information security and the internet.; Great Britain.
Information security and the internet.
BJL ; OS 005.8 DEP
BOOK
1999
005.8 Dwi : Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.; Dwivedi, Himanshu.
Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.
BJL ; 005.8 DWI
BOOK
c2004
005.8 Fry : Security monitoring / Chris Fry and Martin Nystrom.; Fry, Chris.
Security monitoring / Chris Fry and Martin Nystrom.
BJL ; TK5105.59 .F79 2009
BOOK
c2009
005.8 Har : Mastering Web services security / Bret Hartman...[et al].
Mastering Web services security / Bret Hartman...[et al].
BJL ; 005.8 HAR
BOOK
2003
005.8 Kee : Electronic commerce relationships : trust by design / Peter Keen ... [et al.].
Electronic commerce relationships : trust by design / Peter Keen ... [et al.].
BJL ; 005.8 KEE
BOOK
2000
005.8 Kru : Security+ prep guide.; Krutz, Ronald L.
Security+ prep guide.
BJL ; 005.8 KRU
BOOK
2003
005.8 Lev : Crypto : secrecy and privacy in the new code war / Steven Levy.; Levy, Steven.
Crypto : secrecy and privacy in the new code war / Steven Levy.
BJL ; QA76.9.A25 L49 2001
BOOK
c2000
005.8 Lin : Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.; Lindskog, Helena.
Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.
BJL ; 005.8 LIN
BOOK
2003
005.8 Man : Incident response & computer forensics / Chris Prosise, Kevin Mandia.; Prosise, Chris.
Incident response & computer forensics / Chris Prosise, Kevin Mandia.
BJL ; 005.8 MAN
BOOK
2003
005.8 Mcc : Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz.; McClure, Stuart.
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George K
BJL ; 005.8 MCC
BOOK
1999
005.8 Mcn : Network security assessment / Chris McNab.; McNab, Chris
Network security assessment / Chris McNab.
BJL ; 005.8 MCN
BOOK
c2004
005.8 Men
Investigative data mining for security and criminal detection / Jesús Mena.
BJL ; QA76.9.D343
BOOK
2003
Investigative data mining for security and criminal detection / Jesús Mena.
BJL ; QA76.9.D343
BOOK
2003
005.8 Oak : Java security.; Oaks, Scott.
Java security.
BJL ; 005.8 OAK
BOOK
1998
005.8 Ogl : Practical firewalls.; Ogletree, Terry.
Practical firewalls.
BJL ; 005.8 OGL
BOOK
2000
005.8 Rus : Computer security basics / Deborah Russell and G.T. Gangemi, Sr.; Russell, Deborah.
Computer security basics / Deborah Russell and G.T. Gangemi, Sr.
BJL ; 005.8 RUS
BOOK
1991
005.8 Sca : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; Scambray, Joel.
Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, V
BJL ; QA76.9.A25
BOOK
c2011
005.8 Sch : Building open source network security tools : components and techniques.; Schiffman, Mike D.
Building open source network security tools : components and techniques.
BJL ; 005.8 SCH
BOOK
2002
005.8 Spe : The personal internet security guidebook : keeping hackers and crackers out of your home.; Speed, Tim.
The personal internet security guidebook : keeping hackers and crackers out of your home.
BJL ; 005.8 SPE
BOOK
2002
005.8 Tox : Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.; Toxen, Bob.
Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.
BJL ; QA76.76.O63
BOOK
c2003
005.8 Vie : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; Viega, John.
The myths of security : what the computer security industry doesn't want you to know / by John Viega.
BJL ; QA76.9.A25 V55 2009
BOOK
c2009
005.8 Wal : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.
Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet
BJL ; QA76.9.A25 E5425 2007
BOOK
c2007
005.82 Gar : PGP : Pretty Good Privacy.; Garfinkel, Simson.
PGP : Pretty Good Privacy.
BJL ; 005.82 GAR
BOOK
1995
005.82 Knu : Java cryptography.; Knudsen, Jonathan.
Java cryptography.
BJL ; 005.82 KNU
BOOK
1998
005.84 Bow : Worm : the first digital world war / Mark Bowden.; Bowden, Mark,
Worm : the first digital world war / Mark Bowden.
BJL ; QA76.76.C68 B6 2011
BOOK
c2011
005.84 Gri : Malicious mobile code : virus protection for Windows.; Grimes, Roger A.
Malicious mobile code : virus protection for Windows.
BJL ; 005.84 GRI
BOOK
2001
006.3 Big : Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus.; Bigus, Joseph P.
Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus.
BJL ; 006.3 BIG
BOOK
2001
006.3 Bri : Building a digital human / Ken Brilliant.; Brilliant, Ken.
Building a digital human / Ken Brilliant.
BJL ; TJ211
BOOK
c2003
006.3 Cai : Digital human modeling : trends in human algorithms / Yang Cai (ed.).
Digital human modeling : trends in human algorithms / Yang Cai (ed.).
BJL ; QA76.9.C65 D535 2008
BOOK
c2008
006.3 Din : Understanding agent systems / Mark d'Inverno, Michael Luck.; D'Inverno, Mark.
Understanding agent systems / Mark d'Inverno, Michael Luck.
BJL ; QA76.76.I58 D56 2003
BOOK
c2004
006.3 Ear : Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.).
Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.).
BJL ; 006.3 EAR
BOOK
2002
006.3 Evo : Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conference, EvoBIO 2010, Istanbul, Turkey, April 7-9, 2010, proceedings / Clara Pizzuti, Marylyn D. Ritchie, Mario Giacobini (eds.).; EvoBIO 2010
Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conferenc
BJL ; QA76.618
BOOK
c2010
006.3 Hay : My mother was a computer : digital subjects and literary texts / N. Katherine Hayles.; Hayles, N. Katherine.
My mother was a computer : digital subjects and literary texts / N. Katherine Hayles.
BJL ; Q342
BOOK
2005
006.3 Jai : Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, editors.
Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, edito
BJL ; QA76.76.I58 I574 2002
BOOK
c2002
006.3 Klu : Intelligent information agents : the AgentLink perspective / Matthias Klusch ... [et al.] (eds.).
Intelligent information agents : the AgentLink perspective / Matthias Klusch ... [et al.] (eds.).
BJL ; 006.3 KLU
BOOK
c2003
006.3 Liu : Autonomous agents and multi-agent systems : explorations in learning, self-organization and adaptive computation / Jiming Liu.; Liu, Jiming.
Autonomous agents and multi-agent systems : explorations in learning, self-organization and adaptive
BJL ; 006.3 LIU
BOOK
c2001
006.3 Neg : Artificial intelligence : a guide to intelligent systems / Michael Negnevitsky.; Negnevitsky, Michael.
Artificial intelligence : a guide to intelligent systems / Michael Negnevitsky.
BJL ; QA76.76.E95 .N44 2005
BOOK
2005
006.3 Pep : The post-human condition.; Pepperell, Robert.
The post-human condition.
BJL ; 006.3 PEP
BOOK
1997
006.3 Rut : From brows to trust : evaluating embodied conversational agents / edited by Zsofia Ruttkay and Catherine Pelachaud.
From brows to trust : evaluating embodied conversational agents / edited by Zsofia Ruttkay and Cather
BJL ; 006.3 RUT
BOOK
c2004
006.3 Shi : Turing test : verbal behavior as the hallmark of intelligence / edited by Stuart M. Shieber.
Turing test : verbal behavior as the hallmark of intelligence / edited by Stuart M. Shieber.
BJL ; Q341
BOOK
c2004
006.3 Sto : Layered learning in multiagent systems : a winning approach to robotic soccer.; Stone, Peter,
Layered learning in multiagent systems : a winning approach to robotic soccer.
BJL ; 006.3 STO
BOOK
2000
006.3 Sug : Intelligent support systems : knowledge management.
Intelligent support systems : knowledge management.
BJL ; 006.3 SUG
BOOK
c2002
006.3 Vaz : The role of norms and electronic institutions in multi-agent systems : the HarmonIA framework / Javier Vasquez-Salceda.; Vazquez-Salceda, Javier.
The role of norms and electronic institutions in multi-agent systems : the HarmonIA framework / Javie
BJL ; 006.3 VAZ
BOOK
c2004
006.3014 Jor : Signs, search and communication : semiotic aspects of artificial intelligence / edited by Rene J. Jorna, Barend van Heusden, Roland Posner.
Signs, search and communication : semiotic aspects of artificial intelligence / edited by Rene J. Jor
BJL ; P99
BOOK
1993
006.312 Jan : Data analysis with open source tools / Philipp K. Janert.; Janert, Philipp K.
Data analysis with open source tools / Philipp K. Janert.
BJL ; QA76.9.D343
BOOK
c2011
006.312 Rus : Mining the social web / Matthew A. Russell.; Russell, Matthew A.,
Mining the social web / Matthew A. Russell.
BJL ; QA76.9.D343
BOOK
c2011