Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby Cal Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
005.8 G18p 2003 : Garfinkel, Simson.     
      Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 G758s 2003 : Graff, Mark.     
      Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 H115 2003      
      Hacker's challenge 2 : test your network security & forensic skills / Mike D. Schiffman ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 H115c 2006      
      Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / David Pollino ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2006
005.8 H117s 2011 : Hadnagy, Christopher.     
      Social engineering : the art of human hacking / by Christopher Hadnagy. Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 H217 2005      
      Hardening network security / John Mallery ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2005
005.8 H246n 2005 : Harrington, Jan L.     
      Network security : a practical approach / Jan L. Harrington. Axe 3rd Floor Stacks:Available   Print Material 2005
005.8 H835s 2006 : Howard, Michael,     
      The security development lifecycle : SDL, a process for developing demonstrably more secure software Axe 3rd Floor Stacks:Available   Print Material 2006
005.8 H835t 2010 : Howard, Michael,     
      24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David L Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 H835w 2003 : Howard, Michael,     
      Writing secure code / Michael Howard and David LeBlanc. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 In3 2007      
      Information security research : new methods for protecting against cyber threats / Department of Defe Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 In8 2008      
      Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini. Axe 3rd Floor Stacks:Available   Print Material 2008
005.8 K116e 2007 : Kadrich, Mark.     
      Endpoint security / Mark Kadrich. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 K159i 2008 : Katz, Jonathan,     
      Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell. Axe 3rd Floor Stacks:Available   Print Material 2008
005.8 K658c : Kizza, Joseph Migga.     
      Computer network security and cyber ethics / by Joseph Migga Kizza. Axe 3rd Floor Stacks:Available   Print Material 2001
005.8 L498p 2006 : Ledford, Jerri L.     
      The personal cybersecurity Bible / Jerri L. Ledford. Axe 3rd Floor Stacks:Available   Print Material 2006
005.8 L579c : Levy, Steven.     
      Crypto : how the code rebels beat the government, saving privacy in the digital age / Steven Levy. Axe 3rd Floor Stacks:Available   Print Material 2001
005.8 L74c 2009 : Liu, Dale.     
      Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu Axe 3rd Floor Stacks:Available   Print Material 2009
005.8 L742s 2011 : Liu, Lei,     
      Security and policy driven computing / Lei Liu. Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 M127o 2007 : McCarthy, Linda.     
      Own your space : keep yourself and your stuff safe online / Linda McCarthy. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 M178s 2006 : McGraw, Gary,     
      Software security : building security in / Gary McGraw. Axe 3rd Floor Stacks:Available   Print Material 2006
005.8 N389 2011      
      Network security, administration, and management : advancing technology and practice / Dulal Chandra Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 N467c 2010 : Newman, Robert C.     
      Computer security : protecting digital resources / Robert C. Newman. Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 On2w 2003 : O'Neill, Mark.     
      Web services security / Mark O'Neill ... [et al]. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P194c 2004 : Panko, R. R.     
      Corporate computer and network security / Raymond R. Panko. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P483s 2003 : Pfleeger, Charles P.,     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P483s 2007 : Pfleeger, Charles P.,     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 P538h 2010 : Philipp, Aaron.     
      Hacking exposed : computer forensics / Aaron Philipp, David Cowen, Chris Davis. Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 P599f 2003 : Pieprzyk, Josef,     
      Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P939 2011      
      Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leona Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 R126i 2010 : Raggad, Bel G.     
      Information security management : concepts and practice / Bel G. Raggad. Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 Rog : Rogers, Jeni,     
      200+ ways to protect your privacy : simple ways to prevent hacks and protect your privacy--on and off Eureka Non-Fiction:Available   Print Material 2019
005.8 Sch58d 2015 : Schneier, Bruce,     
      Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. Axe 3rd Floor Stacks:Available   Print Material 2015
005.8 Sd46 2007 : SDM 2007     
      Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sd46 2010 : SDM 2010     
      Secure data management : 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010 : proceedings / W Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 Se26 2004      
      The Secure online business handbook : e-Commerce, IT functionality, & business continuity / [consulta Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 Se262c 2012      
      Securing the clicks : network security in the age of social media / Gary Bahadur ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2012
005.8 Se263 2007      
      Security, privacy and trust in modern data management / Milan Petkovic, Willem Jonker (eds.). Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sh44h 2003 : Shema, Mike.     
      Hacknotes web security portable reference / Mike Shema. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 Sl12s 2004 : Slade, Robert.     
      Software forensics : collecting evidence from the scene of a digital crime / Robert M. Slade. Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 So47c 2011 : Solomon, Michael     
      Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett. Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 Sp32p 2002 : Speed, Tim.     
      The personal Internet security guidebook : keeping hackers and crackers out of your home / Timothy Sp Axe 3rd Floor Stacks:Available   Print Material 2002
005.8 Ste : Steinberg, Joseph,     
      Cybersecurity for Dummies / by Joseph Steinberg. Eureka Non-Fiction:Available   E-Book/E-Doc 2020
005.8 Sz56a 2005 : Szor, Peter.     
      The art of computer virus research and defense / Peter Szor. Axe 3rd Floor Stacks:Available   Print Material 2005
005.8 T635d 2011 : Torrenzano, Richard.     
      Digital assassination : protecting your reputation, brand, or business against online attacks / Richa Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 V887c 2007 : Volonino, Linda.     
      Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; cont Axe 3rd Floor Stacks:Available   Print Material 2007
005.8023 M228c 2007 : McMillan, Troy.     
      Change your career. Computer network security as your new profession / Troy McMillan. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8068 If5s 2005 : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems     
      Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG Axe 3rd Floor Stacks:Available   Print Material 2005
005.82 B326d 2007 : Bauer, Friedrich Ludwig,     
      Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer. Axe 3rd Floor Stacks:Available   Print Material 2007
005.82 B934r : Burnett, Steve.     
      RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine. Axe 3rd Floor Stacks:Available   Print Material 2001
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only