|
121.
|
Secure key establishment
by Choo, Kim-Kwang Raymond. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
|
|
122.
|
Elsevier's dictionary of information security in English, German, French and Russian
by Radichkova, B | Manoilov, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
|
|
123.
|
Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
|
|
124.
|
Security in wireless ad hoc and sensor networks
by Cayirci, Erdal | Rong, Chunming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
|
|
125.
|
Network security fundamentals
by Reese, Rachelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
|
|
126.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|
|
127.
|
Security of information and communication networks
by Kartalopoulos, Stamatios V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
|
|
128.
|
Schneier on security
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
|
|
129.
|
Security in a Web 2.0+ world : a standards based approach
by Solari, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
130.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
131.
|
Innocent code : a security wake up call for Web programmers.
by Huseby, Sverre H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
|
|
132.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|
|
133.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
134.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
135.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
136.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
137.
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
by Buttyan, Levente | Hubaux, Jean-Pierre. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
|
|
138.
|
Security and quality of service in ad hoc wireless networks
by Mishra, Amitabh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
|
|
139.
|
Digital identity management : technological, business, and social implications
by Birch, David G. W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
|
|
140.
|
Security monitoring
by Fry, Chris | Nystrom, Martin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
|