|
1.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
2.
|
Security in wireless ad hoc and sensor networks
by Cayirci, Erdal | Rong, Chunming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
|
|
3.
|
Network security fundamentals
by Reese, Rachelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
|
|
4.
|
Security in a Web 2.0+ world : a standards based approach
by Solari, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
5.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
6.
|
Innocent code : a security wake up call for Web programmers.
by Huseby, Sverre H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
|
|
7.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|
|
8.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
9.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
10.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
11.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
12.
|
Error correcting coding and security for data networks : analysis of the superchannel concept
by Kabatiansky, G | Krouk, E | Semenov, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 KAB] (1).
|
|
13.
|
Web security sourcebook : a complete guide to web security threats and solutions
by Geer, Daniel | Ranum, Marcus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
|
|
14.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|