|
381.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|
|
382.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|
|
383.
|
Information security illuminated
by Chapple, Mike | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
384.
|
Complete Guide to Internet Security
by Merkow, Mark S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
|
|
385.
|
Security and privacy in user modeling
by Schreck, Jorg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
386.
|
Writing information security policies
by Barman, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
387.
|
Digital watermarking for digital media
by Seitz, Juergen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
|
|
388.
|
Machine learning and data mining for computer security : methods and applications
by Maloof, Marcus A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
389.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
390.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
391.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
392.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|
|
393.
|
Microsoft Windows security for Windows XP and Windows 2000: inside out
by Siechert, Carl | Bott, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BOT] (2).
|
|
394.
|
Network security and management
by Singh, Brijendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
395.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
396.
|
Security warrior
by Peikari, Cyrus | Chuvakin, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
|
|
397.
|
Applied cryptography : protocols, algorithms and source code in C
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
|
|
398.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
399.
|
Traffic analysis for network security
by Chen, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
400.
|
Bug hunter's diary : a guided tour through the wilds of software security.
by Klein, Tobias. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco No Starch Press 2011Availability: Items available for loan: [Call number: 005.8 KLE] (1).
|