|
21.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
22.
|
Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption
by Remy, David | Rosenberg, Jothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
|
|
23.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
24.
|
Public key infrastructure : building trusted applications and web services
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
25.
|
Technical guide to IPSec virtual private networks
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
|
|
26.
|
Disruptive security technologies with mobile code and peer to peer networks
by Brooks, Richard R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
27.
|
Network security technologies
by Fung, Kwok T. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
28.
|
Cyber security : turning national solutions into international cooperation
by Lewis, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
|
|
29.
|
Policy-Based Network Management : solutions for the next generation
by Strassner, John C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2003Availability: Items available for loan: [Call number: 004.6 STR] (1).
|
|
30.
|
Internet and intranet security
by Oppliger, Rolf. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
31.
|
Non-Repudiation in electronic commerce
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
|
|
32.
|
Multicast and group security
by Hardjono, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
33.
|
Security in wireless LANs and MANs
by Hardjono, Thomas | Dondeti, Lakshminath R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
34.
|
Computer forensics : computer crime scene investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
35.
|
Software vulnerability guide
by Thompson, Herbert H | Chase, Scott G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
|
|
36.
|
Advances in security and payment methods for mobile commerce
by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
|
|
37.
|
Web and information security
by Thuraisingham, Bhavani | Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
38.
|
Internet and intranet security management : risks and solutions
by Janczewski, Lech. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
|
|
39.
|
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by Lioy, Antonio | Mazzocchi, Daniele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
|
|
40.
|
Trust and privacy in digital business : first international conference, Trustbus 2004, Zaragoza, Spain, August 30 - September 1, 2004 ; proceedings
by Katsikas, Sokratis | Lopez, Javier | Pernul, Gunther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 KAT] (1).
|