註記  
005.8 W184 : Wang, Yun   
      Statistical techniques for network security : modern statistically-based intrusion detection and prot 總館; 005.8 W184   c2009
005.8 W184.1 : Wang, Cliff   
      Department of defense sponsored information security research : new methods for protecting against cy 總館; 005.8 W184.1   c2007
005.8 W367 : Wayner, Peter,   
      Digital copyright protection / Peter Wayner 總館; 005.8 W367   c1997
005.8 W58 : Whitaker, Andrew   
      Chained exploits : advanced hacking attacks from start to finish / Andrew Whitaker, Keatron Evans, Ja 總館; 005.8 W58   c2009
005.8 W846 : Wong, Caroline   
      Security metrics : a beginner's guide / Caroline Wong 總館; 005.8 W846   c2012
005.8 Y9 : Yu, Zhenwei   
      Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J.P. Tsai 總館; 005.8 Y9   c2011
005.8 Z14 : Zalewski, Michal   
      Silence on the wire : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski 總館; 005.8 Z14   c2005
005.8 Z16 : Zannone, Nicola   
      Security agent-oriented requirements engineering : the SI* modeling language and the secure tropos me 總館; 005.8 Z16   c2009
005.8 Z63 : Zientara, David,   
      Learn pfSense 2.4 : get up and running with pfSense and all the core concepts to build firewall and r 總館; 005.8 Z63   2018
005.82 L897 : Loshin, Peter   
      Simple steps to data encryption : a practical guide to secure computing / Peter Loshin 總館; 005.82 L897   2013
005.82 M919 : Al Maliky, Sattar B. Sadkhan,   
      Multidisciplinary perspectives in cryptology and information security / Sattar B. Sadkhan Al Maliky a 總館; 005.82 M919   2014
005.82 St25 : Stanoyevitch, Alexander   
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander S 總館; 005.82 St25   c2011
no.

Go to Top