Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Member Services
.
Purchase Suggestion
.
New Items List
.
New Items Search
.
State Library NSW
.
State Library VIC
.
Horizontal Menu
Simple Search
.
New Items Search
.
Advanced Search
.
Preferences
.
© LIBERO v6.3.1sp5
Page content
You are here
:
Search Results
Search Results
Your Search for
COMPUTER SECURITY
returned
6
Items
Sort Preference
1 - Title, Publication
2 - Publication, Title
3 - Publication, Author
4 - Author, Publication
5 - Publication Descending
6 - Shelf Location
7 - Author, Title
The titles shown in BOLD have items available, non bold titles do not have any items in stock
Refine Results
Authors:
1
LAKHANI AAMIR
(2)
2
MUNIZ JOSEPH
(2)
1
ALSADOON ABEER
(1)
2
DAIMI KEVIN
(1)
Show more
Authors
Years:
1
2018
(3)
1
2013
(1)
2
2019
(1)
3
2022
(1)
Subjects:
1
COMPUTER SECURITY
(6)
1
COMPUTER NETWORKS SECURITY MEASURES
(3)
1
COMPUTERS ACCESS CONTROL
(2)
2
COMPUTERS GENERAL
(2)
Show more
Subjects
Types:
1
Book
(6)
Collections:
1
NonFiction
(6)
1
Reference
(3)
Display results in table format.
-
Previous Shelf
Top
-
Emerging trends in cybersecurity applications / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun.
005.8 ALSA
1
-
Title:
Emerging trends in cybersecurity applications / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun.
Author:
Year:
2022
Collections:
NonFiction.
Available at:
Sydney
.
-
Fundamentals of information systems security / David Kim, Michael G. Solomon.
Kim, David (Information technology security consultant)
005.8 DKIM 2018
2
-
Title:
Fundamentals of information systems security / David Kim, Michael G. Solomon.
Author:
Kim, David (Information technology security consultant)
Year:
2018
Collections:
NonFiction, Reference.
Available at:
Melbourne, Sydney
.
-
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart.
Nelson, Bill
005.8 NELS 2019
3
-
Title:
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart.
Author:
Nelson, Bill
Year:
2019
Collections:
NonFiction, Reference.
Available at:
Melbourne, Sydney
.
-
Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.
Whitman, Michael E., 1964-
005.82 WHIT 2018
4
-
Title:
Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.
Author:
Whitman, Michael E., 1964-
Year:
2018
Collections:
NonFiction, Reference.
Available at:
Melbourne, Sydney
.
-
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Muniz, Joseph
006.74 MUNI 2013
5
-
Title:
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Author:
Muniz, Joseph
Year:
2013
Collections:
NonFiction.
Available at:
Melbourne, Sydney
.
-
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Muniz, Joseph
006.74 NAJE 2018
6
-
Title:
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Author:
Muniz, Joseph
Year:
2018
Collections:
NonFiction.
Available at:
Melbourne
.
-
Previous Shelf
Bottom