|
341.
|
Web security sourcebook : a complete guide to web security threats and solutions
by Geer, Daniel | Ranum, Marcus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
|
|
342.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|
|
343.
|
Essential PHP security
by Shiflett, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Beijing: O'Reilly, 2006Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
344.
|
Information security illuminated
by Chapple, Mike | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
345.
|
Digital watermarking for digital media
by Seitz, Juergen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
|
|
346.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
347.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|
|
348.
|
Network security and management
by Singh, Brijendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
349.
|
Hacking Web services
by Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).
|
|
350.
|
Security warrior
by Peikari, Cyrus | Chuvakin, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
|
|
351.
|
Applied cryptography : protocols, algorithms and source code in C
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
|
|
352.
|
Process of network security: Designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
353.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|
|
354.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
355.
|
Policy-based network configuration management for MANETs
by Chadha, Ritu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
356.
|
Traffic analysis for network security
by Chen, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
357.
|
Web security
by Chen, Thomas M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
358.
|
Understanding the digital world : what you need to know about computers, the internet, privacy, and security
by Kernighan, Brian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
|
|
359.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
360.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|