|
221.
|
Online business security systems
by Williams, Godfried B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 WIL] (1).
|
|
222.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
223.
|
Privacy-preserving data mining : models and algorithms
by Aggarwal, Charu C | Yu, Philip S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
|
|
224.
|
Secure integrated circuits and systems
by Verbauwhede, Ingrid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 621.3815 VER] (1).
|
|
225.
|
Smart cards, tokens, security and applications
by Mayes, Keith E | Markantonakis, Konstantinos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
226.
|
New approaches for security, privacy and trust in complex environments
by Venter, Hein | IFIP TC11 International Information Security Conference. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
|
|
227.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
228.
|
Trust Management
by Etalle, Sandro | Marsh, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
|
|
229.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
230.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
231.
|
Open source systems security certification
by Damiani, Ernesto | Ardagna, Claudio Agostino | Ioini, Nabil El. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 DAM] (1).
|
|
232.
|
Future of identity in the information society
by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|
|
233.
|
Secure key establishment
by Choo, Kim-Kwang Raymond. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
|
|
234.
|
Cryptographic security architecture : design and verification
by Gutmann, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
|
|
235.
|
Multimedia data hiding
by Wu, Min | Liu, Bede. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
|
|
236.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
237.
|
Elsevier's dictionary of information security in English, German, French and Russian
by Radichkova, B | Manoilov, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
|
|
238.
|
Trust, complexity and control confidence in a convergent world
by Cofta, Piotr. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 COF] (1).
|
|
239.
|
Windows vista security : securing vista against malicious attacks
by Grimes, Roger A | Johansson, Jesper M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
240.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|