|
241.
|
Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise
by Hoffman, Daniel V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
|
|
242.
|
Web application hacker?s handbook : discovering and exploiting security flaws
by Stuttard, Dafydd. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
|
|
243.
|
Best of 2600 : a hacker odyssey
by Goldstein, Emmanuel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 005.8 GOL] (1).
|
|
244.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
245.
|
Schneier on security
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
|
|
246.
|
Cracking drupal : a drop in the bucket
by Knaddison, Greg James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 006.76 KNA] (1).
|
|
247.
|
Cryptography engineering : design principles and practical applications
by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
248.
|
Security in a Web 2.0+ world : a standards based approach
by Solari, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
249.
|
Information technology security and risk management
by Slay, Jill | Koronios, Andy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Milton: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
250.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
251.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
252.
|
Innocent code : a security wake up call for Web programmers.
by Huseby, Sverre H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
|
|
253.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
254.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
255.
|
Designing Security Architecture Solutions
by Ramachandran, Jay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
|
|
256.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
257.
|
Information security : a strategic approach
by LeVeque, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
|
|
258.
|
Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers
by Mitnick, Kevin D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
|
|
259.
|
Computer security and cryptography
by Konheim, Alan G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
|
|
260.
|
Protecting information : from classical error correction to quantum cryptography
by Loepp, Susan | Wootters, William Kent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 004.1 LOE] (1).
|