|
361.
|
Visual cryptography and secret image sharing
by Climato, Stelvio | Yang, Ching-Nung. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Crc Press, 2011Availability: Items available for loan: [Call number: 005.82 CIM] (1).
|
|
362.
|
Adaptive security management architecture
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
|
|
363.
|
Cyber-physical security
by Clark, Robert M | Hakim, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 CLA] (1).
|
|
364.
|
Detecting peripheral-based attacks on the host memory
by Stewin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2015Availability: Items available for loan: [Call number: 005.84 STE] (1).
|
|
365.
|
DNS security management
by Dooley, Michael | Rooney, Timothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
|
|
366.
|
SCION : a secure internet architecture
by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
|
|
367.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
368.
|
Inside radio : an attack and defense guide
by Yang, Qing | Huang, Lin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: Springer, 2018Availability: Items available for loan: [Call number: 621.382 YAN] (1).
|
|
369.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
370.
|
Android security internals : an in-depth guide to Android's security architecture
by Elenkov, Nikolay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco : No Starch Press, 2015Availability: Items available for loan: [Call number: 004.1675 ELE] (1).
|
|
371.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
372.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
373.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
374.
|
Bitcoin and blockchain security
by Karame, Ghassan | Androulaki, Elli. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Artech House, 2016Availability: Items available for loan: [Call number: 332.178 KAR] (1).
|
|
375.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
376.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
377.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
378.
|
On privacy-preserving protocols for smart metering systems : security and privacy in smart grids
by Borges de Oliveira, Fábio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 621.3191 BOR] (1).
|
|
379.
|
Machine learning approach to phishing detection and defense
by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
|
|
380.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|