|
621.
|
Understanding the digital world : what you need to know about computers, the internet, privacy, and security
by Kernighan, Brian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
|
|
622.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
623.
|
Terrestrial-satellite communication networks : transceivers design and resource allocation
by Kuang, Linling | Jiang, Chunxiao | Qian, Yi | Lu, Jianhua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.3825 KUA] (1).
|
|
624.
|
Cloud enterprise architecture
by Raj, Pethuru. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 004.6782 RAJ] (1).
|
|
625.
|
Adaptive security management architecture
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
|
|
626.
|
Complex networks : a networking and signal processing perspective
by Manoj, B. S | Chakraborty, Abhishek | Singh, Rahul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Prentice Hall 2018Availability: Items available for loan: [Call number: 621.3822 MAN] (1).
|
|
627.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
628.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
629.
|
Computer systems : digital design, fundamentals of computer architecture and assembly language
by Elahi, Ata. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.382 ELA] (1).
|
|
630.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
631.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
632.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
633.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
634.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
635.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
636.
|
Machine learning approach to phishing detection and defense
by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
|
|
637.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
638.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
639.
|
Mathematical theories of distributed sensor networks
by Iyengar, Sitharama S | Boroojeni, Kianoosh G [aut] | Balakrishnan, N [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2014Availability: Items available for loan: [Call number: 621.382 IYE] (1).
|
|
640.
|
Learning-based VANET Communication and Security Techniques
by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).
|