|
21.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
22.
|
Computer architecture and security fundamentals of designing secure computer systems
by Wang, Shuangbao Paul | Ledley, Robert S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
23.
|
Quantum magnetism
by Barbara, B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2008Availability: Items available for loan: [Call number: 538 BAR] (1).
|
|
24.
|
Sensors for environment, health and security : advanced materials and technologies
by Baraton, Marie-Isabelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
|
|
25.
|
Sensors for environment, health and security : advanced materials and technologies
by Baraton, Marie-Isabelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
|
|
26.
|
Electronic payment systems for E-commerce
by O'Mahony, Donal. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 OMA] (1).
|
|
27.
|
Java card for E-payment applications
by Hassler, Vesna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.133 HAS] (1).
|
|
28.
|
Implementing electronic card payment systems
by Radu, Cristian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 RAD] (1).
|
|
29.
|
Security technologies for the world wide web
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
30.
|
Computer and intrusion forensics
by Mohay, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
|
|
31.
|
Wireless sensor network security
by Zhou, Jianying | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
|
|
32.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
33.
|
Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
by Last, Mark | Kandel, Abraham. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
|
|
34.
|
Software and systems safety : specification and verification
by Broy, Manfred | Hoare, Tony | Leuxner, Christian | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
35.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
36.
|
Techniques for designing and analyzing algorithms
by Stinson, Douglas R. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 518.1 STI] (1).
|
|
37.
|
Practical mathematical cryptography
by Gjosteen, Kristian. Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
|