|
441.
|
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W | Friedman, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
442.
|
Bits and atoms : information and communication technology in areas of limited statehood
by Livingston, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford: Oxford University Press, 2014Availability: Items available for loan: [Call number: 320.014 LIV] (1).
|
|
443.
|
CORBA Security
by Blakley, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
|
|
444.
|
Distributed Operating Systems and Algorithms
by Chow, Randy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 005.43 CHO] (1).
|
|
445.
|
Programming Windows Security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
446.
|
SSL and TLS : designing and building secure systems
by Rescorla, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
|
|
447.
|
Cryptography Decrypted
by Mel, H. X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
|
|
448.
|
Web Security
by Stein, Lincoln D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
449.
|
Linux and UNIX shell programming
by Tansley | Tansley, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.422 TAN] (1).
|
|
450.
|
Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide
by Welch-Abernathy, Dameon | Welch-Abernathy, Dameon D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Addison-Wesley 2002Availability: Items available for loan: [Call number: 005.8 WEL] (1).
|
|
451.
|
Computer forensics: Incident response essentials
by Kruse, Warren G | Heiser, Jay G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
452.
|
Effective incident response team
by Lucas, Julie | Moeller, Brain. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
|
|
453.
|
Exploiting software : how to break code
by Gary, McGraw | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
454.
|
Communication Networks : a first course
by Walrand, Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
|
|
455.
|
Management information systems : solving business problems with information technology
by Post, Gerald V | Anderson, David L. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2003Availability: Items available for loan: [Call number: 658.4 POS] (2).
|
|
456.
|
Surveillance or security? : the risks posed by new wiretapping technologies
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
|
|
457.
|
Arguments that count : physics, computing, and missile defense, 1949-2012
by Slayton, Rebecca. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 358.1740973 SLA] (1).
|
|
458.
|
Rethinking public key infrastructures and digital certificates: Building in privacy
by Brands, Stefan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
|
|
459.
|
Protocol : how control exists after decentralization
by Galloway, Alexander R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
460.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|