|
281.
|
Digital audio watermarking techniques and technologies : applications and benchmarks
by Cvejic, Nedeljko | Seppanen, Tapio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.82 CVE] (1).
|
|
282.
|
Securing Web services : practical usage of standards and specifications
by Periorellis, Panos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
283.
|
Watermarking in audio : key techniques and technologies
by He, Xing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Youngstown: Cambria Press, 2008Availability: Items available for loan: [Call number: 005.82 HEX] (1).
|
|
284.
|
Web services security development and architecture : theoretical and practical issues
by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
|
|
285.
|
Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
by Last, Mark | Kandel, Abraham. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
|
|
286.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
287.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan | Slamanig, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
288.
|
Steganography and watermarking
by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
289.
|
Future of the Internet and How to Stop it
by Zittrain, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Penguin Books, 2008Availability: Items available for loan: [Call number: 004.6780112 ZIT] (1).
|
|
290.
|
Embedded Java security : security for mobile devices
by Debbabi, Mourad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
|
|
291.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
292.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
293.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
294.
|
Professional ASP. NET security
by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
|
|
295.
|
Electronic projects for home security
by Bishop, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: BPB Publications, 1992Availability: Items available for loan: [Call number: 621.38928 BIS] (1).
|
|
296.
|
Wireless hacking : projects for wi-fi enthusiasts
by Barken, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
297.
|
Trusted computing for embedded systems
by Candaele, Bernard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8 CAN] (1).
|
|
298.
|
Construction and analysis of safe, secure, and interoperable smart devices : international workshop,CASSIS 2004, Marseille, France, March 10-14, 2004 ; revised selected papers
by Burdy, Lilian | Barthe, Gilles | Huisman, Marieke | Huisman, Marieke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 BAR] (1).
|
|
299.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
300.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|