|
181.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
182.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
183.
|
Professional ASP. NET security
by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
|
|
184.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
185.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
186.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
187.
|
Computer network security : theory and practice
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
188.
|
Security for web services and service-oriented architectures
by Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
|
|
189.
|
Security access in wireless local area networks: from architecture and protocols to realization
by Ma, Jianfeng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 MAJ] (1).
|
|
190.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
191.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|
|
192.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
193.
|
Mobile hybrid intrusion detection : the MOVICAB-IDS system
by Herrero, Alvaro | Corchado, Emilio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 HER] (1).
|
|
194.
|
Collaborative financial infrastructure protection : tools, abstractions, and middleware
by Baldoni, Roberto | Chockler, Gregory. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
195.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
196.
|
Information systems security : security management, metrics, frameworks and best practices
by Godbole, Nina S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
|
|
197.
|
Network security : a practical approach
by Harrington, Jan L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
198.
|
How to cheat at configuring Open Source security tools
by Alder, Raven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 ALD] (1).
|
|
199.
|
Protecting your PC
by Barile, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
|
|
200.
|
Network infrastructure security
by Weaver, Randy | Weaver, Dawn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
|