|
1101.
|
Social networks with rich edge semantics
by Zheng, Quan | Skillicorn, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2017Availability: Items available for loan: [Call number: 302.3015118 ZHE] (1).
|
|
1102.
|
Introduction to machine learning with applications in information security
by Stamp, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2018Availability: Items available for loan: [Call number: 004.6 STA] (1).
|
|
1103.
|
SCION : a secure internet architecture
by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
|
|
1104.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
1105.
|
Computer systems : digital design, fundamentals of computer architecture and assembly language
by Elahi, Ata. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.382 ELA] (1).
|
|
1106.
|
Green photonics and electronics
by Eisenstein, Gadi | Bimberg, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerlands Springer 2018Availability: Items available for loan: [Call number: 621.36 EIS] (1).
|
|
1107.
|
Introduction to deep learning : from logical calculus to artificial intelligence
by Skansi, Sandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 006.3 SKA] (1).
|
|
1108.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
1109.
|
Deep neural networks in a mathematical framework
by Caterini, Anthony L | Chang, Dong Eui. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 006.32 CAT] (1).
|
|
1110.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
1111.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
1112.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
1113.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
1114.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
1115.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
1116.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
1117.
|
Machine learning approach to phishing detection and defense
by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
|
|
1118.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
1119.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
1120.
|
Massive MIMO networks : spectral, energy, and hardware efficiency
by BjoÌrnson, Emil | Hoydis, Jakob | Sanguinetti, Luca. Publisher: Hanover, USA Now Publishers 2018Availability: No items available Checked out (1).
|