|
261.
|
Elements of UML 2.0 style
by Ambler, Scott W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2005Availability: Items available for loan: [Call number: 005.1 AMB] (1).
|
|
262.
|
Elliptic curves in cryptography
by Blake, I. F | Seroussi, G | Smart, N. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
263.
|
Secure programming cookbook for C and C++
by Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD/O'Reilly, 2003Availability: Items available for loan: [Call number: 005.133 VIE] (1).
|
|
264.
|
Myths of security : what the computer security industry doesn't want you to know
by Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 VIE] (1).
|
|
265.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
266.
|
Hands on ethical hacking and network defense
by Simpson, Michael T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
|
|
267.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
268.
|
Maximum security
by Anonymous. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
|
|
269.
|
Writing secure code
by Howard, Michael | LeBlanc, David. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Microsoft Press, 2002Availability: Items available for loan: [Call number: 005.8 HOW] (2).
|
|
270.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
271.
|
Security development lifecycle
by Howard, Michael | Lipner, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 HOW] (2).
|
|
272.
|
Investigative data mining for security and criminal detection
by Mena, Jesus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
|
|
273.
|
Internet security : hacking, counterhacking, and society
by Himma, Kenneth Einar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
|
|
274.
|
Information security : contemporary cases
by Wright, Marie A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
|
|
275.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
276.
|
Reversing : secrets of reverse engineering
by Eilam, Eldad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley, 2005Availability: Items available for loan: [Call number: 005.1 EIL] (1).
|
|
277.
|
Beginning cryptography with Java
by Hook, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
|
|
278.
|
13th IEEE Computer Security Foundations Workshop
by Titsworth, Frances M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
|
|
279.
|
Towards a quarter-century of public key cryptography
by Koblitz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
|
|
280.
|
Cryptography : an introduction
by Yashchenko, V. V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2002Availability: Items available for loan: [Call number: 005.82 YAS] (1).
|