|
141.
|
Understanding voice over IP security
by Johnston, Alan B | Piscitello, David M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
|
|
142.
|
Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.
by Price, Mike | Foster, James C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
|
|
143.
|
IT security project management : handbook
by Snedaker, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
|
|
144.
|
Communications and Networking : an introduction
by Cowley, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 004.6 COW] (1).
|
|
145.
|
Internet and intranet security management : risks and solutions
by Janczewski, Lech. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
|
|
146.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
147.
|
Developing Trust
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Apress, 2002Availability: Items available for loan: [Call number: 005.8 CUR] (1).
|
|
148.
|
Hack Proofing Your Wireless Network
by Barnes, Christian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, 2002Availability: Items available for loan: [Call number: 621.319 BAR] (1).
|
|
149.
|
Cisco security professional's guide to secure intrusion detection systems
by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
|
|
150.
|
Technology and Privacy
by Agre, Philip E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
|
|
151.
|
Cryptographic hardware and embedded systems - CHES 2002: 4th international workshop Redwood shores, CA, USA, August 13-15, 2002 revised papers
by Kaliski, Burton S | Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
152.
|
Information hiding
by Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
|
|
153.
|
Secure Systems Development with UML
by Jurjens, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).
|
|
154.
|
Software security-theories and systems
by Okada, Mitsuhiro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
|
|
155.
|
Personal Wireless Communications : IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003 : Proceedings
by Conti, Marco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 CON] (1).
|
|
156.
|
Computer Safety, Reliability, and Security : 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003 : Proceedings
by Anderson, Stuart | Felici, Massimo | Littlewood, Bev. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIT] (1).
|
|
157.
|
Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings
by Qing, Sihan | Gollmann, Dieter | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 QIN] (1).
|
|
158.
|
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by Boyd, Colin | Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
|
|
159.
|
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by Lioy, Antonio | Mazzocchi, Daniele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
|
|
160.
|
Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings
by Zhou, Jianying | Han, Youngfei | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
|