|
1.
|
Advances in computers : information security. Volume 60
by Zelkowitz, Marvin V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004 ZEL] (1).
|
|
2.
|
Social Life of Information
by Brown, John Seely | Duguid, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Harvard Business School Press, 2000Availability: Items available for loan: [Call number: 303.48 BRO] (1).
|
|
3.
|
Web and information security
by Thuraisingham, Bhavani | Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
4.
|
Tools for Teaching Computer Networking and Hardware Concepts
by Sarkar, Nurul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2006Availability: Items available for loan: [Call number: 004.607122 SAR] (1).
|
|
5.
|
Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers
by Lim, Chae Hoon | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
|
|
6.
|
Distributed Computing - IWDC 2004 : sixth International workshop, Kolkata, India, December 27-30, 2004 ; proceedings
by Nabanita, Das | Das, Sajal K | Sen, Arunabha | Sinha, Bhabani P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 DAS] (1).
|
|
7.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
8.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|
|
9.
|
Electronic healthcare information security
by Dube, Kudakwashe | Mtenzi, Fredrick | Shoniregun, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 610.285 SHO] (1).
|
|
10.
|
Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by Ioannidis, John | Keromytis, Angelos D | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
|
|
11.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
12.
|
Handbook of information and communication security
by Stavroulakis, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
13.
|
Information security : theory and practice
by Patel, Dhiren R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
|
|
14.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
15.
|
Internet infrastructure security
by Chakrabarti, Anirban | Manimaran, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 621.3192 CHA] (1).
|
|
16.
|
Security and information assurance
by Malek, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2003Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
17.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|