|
261.
|
Security warrior
by Peikari, Cyrus | Chuvakin, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
|
|
262.
|
Process of network security: Designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
263.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|
|
264.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
265.
|
Policy-based network configuration management for MANETs
by Chadha, Ritu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
266.
|
Traffic analysis for network security
by Chen, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
267.
|
Web security
by Chen, Thomas M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
268.
|
Understanding the digital world : what you need to know about computers, the internet, privacy, and security
by Kernighan, Brian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
|
|
269.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
270.
|
Adaptive security management architecture
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
|
|
271.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
272.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
273.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
274.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
275.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
276.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
277.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
278.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
279.
|
Machine learning approach to phishing detection and defense
by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
|
|
280.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|