註記  
005.8 Sa74 : Sarna-Starosta, Beata   
      Constraint-based analysis of security properties / Beata Sarna-Starosta 總館; 005.8 Sa74   c2008
005.8 Sa82 : Sathnur, Ashwini,   
      The business of cybersecurity : foundations and ideologies / Ashwini Sathnur 總館; 005.8 Sa82   2019
005.8 Sch57 : Schneier, Bruce,   
      Secrets and lies : digital security in a networked world / Bruce Schneier 總館; 005.8 Sch57   2000
005.8 Sch71 : Schreck, Jorg   
      Security and privacy in user modeling / by Jorg Schreck 總館; 005.8 Sch71   c2003
005.8 Se26 2007 : SecureComm 2007   
      2007 Third International conference on security and privacy in communication networks and workshops : 總館; 005.8 Se26 2007   c2007
005.8 Se26.1 : Krüger, Jörg   
      The secure information society : ethical, legal and political challenges / Jörg Krüger, Bertram Nicko 總館; 005.8 Se26.1   c2013
005.8 Sh62 : Shimeall, Timothy,   
      Introduction to information security : a strategic-based approach / Timothy J. Shimeall, Jonathan M. 總館; 005.8 Sh62   2014
005.8 Si56 : Simonds, Fred   
      Network security : data and voice communications / Fred Simonds 總館; 005.8 Si56   c1996
005.8 St18 4th.ed. : Stallings, William   
      Cryptography and network security : principles and practice / William Stallings 公館分館; 005.8 St18 4th.ed.   c2006
005.8 St18 7th.ed. : Stallings, William,   
      Cryptography and network security : principles and practice / William Stallings 公館分館; 005.8 St18 7th.ed.   2017
005.8 T482 : Time-Life Books   
      Computer security / by the editors of Time-Life Books 公館分館; 005.8 T482   1990
005.8 V26 : Van Puyvelde, Damien,   
      Cybersecurity : politics, governance and conflict in cyberspace / Damien Van Puyvelde, Aaron Brantly 公館分館; 005.8 V26   2019
no.

Go to Top