Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby Cal Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
005.8 Sch58d 2015 : Schneier, Bruce,     
      Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. Axe 3rd Floor Stacks:Available   Print Material 2015
005.8 Sd46 2007 : SDM 2007     
      Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sd46 2010 : SDM 2010     
      Secure data management : 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010 : proceedings / W Axe 3rd Floor Stacks:Available   Print Material 2010
005.8 Se26 2004      
      The Secure online business handbook : e-Commerce, IT functionality, & business continuity / [consulta Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 Se262c 2012      
      Securing the clicks : network security in the age of social media / Gary Bahadur ... [et al.]. Axe 3rd Floor Stacks:Available   Print Material 2012
005.8 Se263 2007      
      Security, privacy and trust in modern data management / Milan Petkovic, Willem Jonker (eds.). Axe 3rd Floor Stacks:Available   Print Material 2007
005.8 Sh44h 2003 : Shema, Mike.     
      Hacknotes web security portable reference / Mike Shema. Axe 3rd Floor Stacks:Available   Print Material 2003
005.8 Sl12s 2004 : Slade, Robert.     
      Software forensics : collecting evidence from the scene of a digital crime / Robert M. Slade. Axe 3rd Floor Stacks:Available   Print Material 2004
005.8 So47c 2011 : Solomon, Michael     
      Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett. Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 Sp32p 2002 : Speed, Tim.     
      The personal Internet security guidebook : keeping hackers and crackers out of your home / Timothy Sp Axe 3rd Floor Stacks:Available   Print Material 2002
005.8 Ste : Steinberg, Joseph,     
      Cybersecurity for Dummies / by Joseph Steinberg. Eureka Non-Fiction:Available   E-Book/E-Doc 2020
005.8 Sz56a 2005 : Szor, Peter.     
      The art of computer virus research and defense / Peter Szor. Axe 3rd Floor Stacks:Available   Print Material 2005
005.8 T635d 2011 : Torrenzano, Richard.     
      Digital assassination : protecting your reputation, brand, or business against online attacks / Richa Axe 3rd Floor Stacks:Available   Print Material 2011
005.8 V887c 2007 : Volonino, Linda.     
      Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; cont Axe 3rd Floor Stacks:Available   Print Material 2007
005.8023 M228c 2007 : McMillan, Troy.     
      Change your career. Computer network security as your new profession / Troy McMillan. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8068 If5s 2005 : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems     
      Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG Axe 3rd Floor Stacks:Available   Print Material 2005
005.82 B326d 2007 : Bauer, Friedrich Ludwig,     
      Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer. Axe 3rd Floor Stacks:Available   Print Material 2007
005.82 B934r : Burnett, Steve.     
      RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine. Axe 3rd Floor Stacks:Available   Print Material 2001
005.82 C392i 2011 : Chatterjee, Sanjit.     
      Identity-based encryption / Sanjit Chatterjee, Palash Sarkar. Axe 3rd Floor Stacks:Available   Print Material 2011
005.82 C889 2003      
      Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003 : p Axe 3rd Floor Stacks:Available   Print Material 2003
005.82 C94b 2005 : Curtin, Matt.     
      Brute force : cracking the data encryption standard / Matt Curtin. Axe 3rd Floor Stacks:Available   Print Material 2005
005.82 Eu74a 2004 : EUROCRYPT 2004     
      Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Axe 3rd Floor Stacks:Available   Print Material 2004
005.82 K798a : Koblitz, Neal,     
      Algebraic aspects of cryptography / Neal Koblitz ; with 7 figures. Axe 3rd Floor Stacks:Available   Print Material 1999
005.82 L961b : Lubbe, J. C. A. van der     
      Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee. Axe 3rd Floor Stacks:Available   Print Material 1998
005.82 St25i 2011 : Stanoyevitch, Alexander.     
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander S Axe 3rd Floor Stacks:Available   Print Material 2011
005.82 St57c : Stinson, Douglas R.     
      Cryptography : theory and practice / Douglas R. Stinson. Axe 3rd Floor Stacks:Available   Print Material 1995
005.82 T689i : Trappe, Wade.     
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington. Axe 3rd Floor Stacks:Available   Print Material 2002
005.82 W813c 2007 : Wobst, Reinhard.     
      Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir. Axe 3rd Floor Stacks:Available   Print Material 2007
005.8203 En19 2005      
      Encyclopedia of cryptography and security / editor-in-chief, Henk C.A. van Tilborg. Axe 3rd Floor Stacks:Available   Print Material 2005
005.820951 P943 2004      
      Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen. Axe 3rd Floor Stacks:Available   Print Material 2004
005.824 L373i 2019 : Laurence, Tiana,     
      Introduction to blockchain technology : the many faces of blockchain technology in the 21st century / Axe 3rd Floor Stacks:Available   Print Material 2019
005.84 B672w 2011 : Bowden, Mark,     
      Worm : the first digital world war / Mark Bowden. Axe 3rd Floor Stacks:Available   Print Material 2011
005.84 Sch97s 2002 : Schweitzer, Douglas.     
      Securing the network from malicious code : a complete guide to defending against viruses, worms, and Axe 3rd Floor Stacks:Available   Print Material 2002
005.86 H761i 2011 : Hoog, Andrew.     
      iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and i Axe 3rd Floor Stacks:Available   Print Material 2011
006 J632l 2006 : Johnson, Gary W.,     
      LabVIEW graphical programming / Gary W. Johnson, Richard Jennings. Axe 3rd Floor Stacks:Available   Print Material 2006
006.3 Ar16i : Arbib, Michael A.     
      In search of the person : philosophical explorations in cognitive science / Michael A. Arbib. Axe 3rd Floor Stacks:Available   Print Material 1985
006.3 Bak : Baker, Pamela,     
      ChatGPT / by Pam Baker. Pittsburg 2nd Fl Non-Fiction:DUE 04-25-24   Print Material 2023
006.3 C42i 2006 : Chen, G.     
      Introduction to fuzzy systems / Guanrong Chen, Trung Tat Pham. Axe 3rd Floor Stacks:Available   Print Material 2006
006.3 C65p 2022 : Coeckelbergh, Mark,     
      The political philosophy of AI : an introduction / Mark Coeckelbergh. Axe 3rd Floor Stacks:Available   Print Material 2022
006.3 D6495 2005      
      Do smart adaptive systems exist? : best practice for selection and combination of intelligent methods Axe 3rd Floor Stacks:Available   Print Material 2005
006.3 F989      
      Fuzzy logic for the management of uncertainty / edited by Lotfi A. Zadeh, Janusz Kacprzyk. Axe 3rd Floor Stacks:Available   Print Material 1992
006.3 Gil 1996 : Gillies, Donald,     
      Artificial intelligence and scientific method / Donald Gillies. FSCC Non-Fiction:Available   Print Material 1996
006.3 In8e 2009      
      Intelligent engineering systems and computational cybernetics / J.A. Tenreiro Machado, Bela Patkai, I Axe 3rd Floor Stacks:Available   Print Material 2009
006.3 K141a 2016 : Kaplan, Jerry,     
      Artificial intelligence : what everyone needs to know / Jerry Kaplan. Axe 3rd Floor Stacks:Available   Print Material 2016
006.3 K383s : Kennedy, James F.     
      Swarm intelligence / James Kennedy, Russell C. Eberhart ; with Yuhui Shi. Axe 3rd Floor Stacks:Available   Print Material 2001
006.3 K967a : Kurzweil, Ray.     
      The age of spiritual machines : when computers exceed human intelligence / Ray Kurzweil. Axe 3rd Floor Stacks:Available   Print Material 1999
006.3 M137n 2012 : MacCormick, John,     
      Nine algorithms that changed the future : the ingenious ideas that drive today's computers / John Mac Axe 3rd Floor Stacks:Available   Print Material 2012
006.3 M661 1997      
      Mind design II : philosophy, psychology, artificial intelligence / edited by John Haugeland. Axe 3rd Floor Stacks:Available   Print Material 1997
006.3 P386e : Penrose, Roger.     
      The emperor's new mind : concerning computers, minds, and the laws of physics / Roger Penrose ; forew Axe 3rd Floor Stacks:Available   Print Material 1989
006.3 P386s : Penrose, Roger.     
      Shadows of the mind : a search for the missing science of consciousness / Roger Penrose. Axe 3rd Floor Stacks:Available   Print Material 1994
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only