Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby Cal Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
005.8 P194c 2004 : Panko, R. R.     
      Corporate computer and network security / Raymond R. Panko. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P483s 2003 : Pfleeger, Charles P.,     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P483s 2007 : Pfleeger, Charles P.,     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 P538h 2010 : Philipp, Aaron.     
      Hacking exposed : computer forensics / Aaron Philipp, David Cowen, Chris Davis. Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 P599f 2003 : Pieprzyk, Josef,     
      Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 P939 2011      
      Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leona Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 R126i 2010 : Raggad, Bel G.     
      Information security management : concepts and practice / Bel G. Raggad. Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 Rog : Rogers, Jeni,     
      200+ ways to protect your privacy : simple ways to prevent hacks and protect your privacy--on and off Eureka Non-Fiction:Available   Print Material 2019
005.8 Sch58d 2015 : Schneier, Bruce,     
      Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. Axe 3rd Floor Stacks:Available   Print Material 2015
005.8 Sd46 2007 : SDM 2007     
      Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sd46 2010 : SDM 2010     
      Secure data management : 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010 : proceedings / W Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 Se26 2004      
      The Secure online business handbook : e-Commerce, IT functionality, & business continuity / [consulta Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 Se262c 2012      
      Securing the clicks : network security in the age of social media / Gary Bahadur ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2012
005.8 Se263 2007      
      Security, privacy and trust in modern data management / Milan Petkovic, Willem Jonker (eds.). Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sh44h 2003 : Shema, Mike.     
      Hacknotes web security portable reference / Mike Shema. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 Sl12s 2004 : Slade, Robert.     
      Software forensics : collecting evidence from the scene of a digital crime / Robert M. Slade. Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 So47c 2011 : Solomon, Michael     
      Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett. Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 Sp32p 2002 : Speed, Tim.     
      The personal Internet security guidebook : keeping hackers and crackers out of your home / Timothy Sp Axe 3rd Floor Stacks:Available   Print Material 2002
005.8 Ste : Steinberg, Joseph,     
      Cybersecurity for Dummies / by Joseph Steinberg. Eureka Non-Fiction:Available   E-Books/E-Docs 2020
005.8 Sz56a 2005 : Szor, Peter.     
      The art of computer virus research and defense / Peter Szor. Axe 3rd Floor Stacks:Available   Print Material 2005
005.8 T635d 2011 : Torrenzano, Richard.     
      Digital assassination : protecting your reputation, brand, or business against online attacks / Richa Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 V887c 2007 : Volonino, Linda.     
      Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; cont Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 W583s 2003    
      Security+ certification all-in-one exam guide / Greg White ... [et al.]. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2003
      Security+ certification all-in-one exam guide / Greg White ... [et al.]. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2003
005.80218 P292 2007      
      PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor Axe 3rd Floor Stacks:Available   Print Material 2007
005.8023 M228c 2007 : McMillan, Troy.     
      Change your career. Computer network security as your new profession / Troy McMillan. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8068 If5s 2005 : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems     
      Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG Axe 3rd Floor Stacks:Available   Print Material 2005
005.82 B326d 2007 : Bauer, Friedrich Ludwig,     
      Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer. Axe 3rd Floor Stacks:Available   Print Material 2007
005.82 B934r    
      RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2001
      RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2001
005.82 C392i 2011 : Chatterjee, Sanjit.     
      Identity-based encryption / Sanjit Chatterjee, Palash Sarkar. Axe 3rd Floor Stacks:Available   Print Material 2011
005.82 C889 2003      
      Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003 : p Axe 3rd Floor Stacks:Available   Print Material 2003
005.82 C94b 2005 : Curtin, Matt.     
      Brute force : cracking the data encryption standard / Matt Curtin. Axe 3rd Floor Stacks:Available   Print Material 2005
005.82 Eu74a 2004 : EUROCRYPT 2004     
      Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Axe 3rd Floor Stacks:Available   Print Material 2004
005.82 K798a : Koblitz, Neal,     
      Algebraic aspects of cryptography / Neal Koblitz ; with 7 figures. Axe 3rd Floor Stacks:Available   Print Material 1999
005.82 L961b : Lubbe, J. C. A. van der     
      Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee. Axe 3rd Floor Stacks:Available   Print Material 1998
005.82 St25i 2011 : Stanoyevitch, Alexander.     
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander S Axe 3rd Floor Stacks:Available   Print Material 2011
005.82 St57c : Stinson, Douglas R.     
      Cryptography : theory and practice / Douglas R. Stinson. Axe 3rd Floor Stacks:Available   Print Material 1995
005.82 T689i : Trappe, Wade.     
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington. Axe 3rd Floor Stacks:Available   Print Material 2002
005.82 W813c 2007 : Wobst, Reinhard.     
      Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8203 En19 2005      
      Encyclopedia of cryptography and security / editor-in-chief, Henk C.A. van Tilborg. Axe 3rd Floor Stacks:Available   Print Material 2005
005.820951 P943 2004      
      Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen. Axe 3rd Floor Stacks:Available   Print Material 2004
005.824 L373i 2019 : Laurence, Tiana,     
      Introduction to blockchain technology : the many faces of blockchain technology in the 21st century / Axe 3rd Floor Stacks:Available   Print Material 2019
005.84 B672w 2011 : Bowden, Mark,     
      Worm : the first digital world war / Mark Bowden. Axe 3rd Floor Stacks:Available   Print Material 2011
005.84 Sch97s 2002 : Schweitzer, Douglas.     
      Securing the network from malicious code : a complete guide to defending against viruses, worms, and Axe 3rd Floor Stacks:Available   Print Material 2002
005.86 H761i 2011 : Hoog, Andrew.     
      iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and i Axe 3rd Floor Stacks:Available   Print Material 2011
006 B541l 2006    
      LabView7Express / Robert H. Bishop. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2006
      LabView7Express / Robert H. Bishop. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2006
      LabView7Express / Robert H. Bishop. Axe 3rd Floor Stacks:Available, Axe Compact Discs 1st Floor:Available   Print Material 2006
006 J632l 2006 : Johnson, Gary W.,     
      LabVIEW graphical programming / Gary W. Johnson, Richard Jennings. Axe 3rd Floor Stacks:Available   Print Material 2006
006.1 M821 : Moore, Alannah.     
      Create your own Website using WordPress in a weekend / Alannah Moore. Parsons Non-Fiction:Available   Print Material 2013
006.3 Ar16i : Arbib, Michael A.     
      In search of the person : philosophical explorations in cognitive science / Michael A. Arbib. Axe 3rd Floor Stacks:Available   Print Material 1985
006.3 C42i 2006 : Chen, G.     
      Introduction to fuzzy systems / Guanrong Chen, Trung Tat Pham. Axe 3rd Floor Stacks:Available   Print Material 2006
006.3 D6495 2005      
      Do smart adaptive systems exist? : best practice for selection and combination of intelligent methods Axe 3rd Floor Stacks:Available   Print Material 2005
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only