|
401.
|
Artificial immune system : applications in computer security
by Tan, Ying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-IEEE Computer Society Press, 2016Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
402.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
403.
|
Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project
by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
|
|
404.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
405.
|
Mathematics of secrets : cryptography from caesar ciphers to digital encryption
by Holden, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
|
|
406.
|
Adaptive security management architecture
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
|
|
407.
|
Phishing dark waters : the offensive and defensive sides of malicious emails
by Hadnagy, Christopher | Fincher, Michele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2015Availability: Items available for loan: [Call number: 364.1632 HAD] (1).
|
|
408.
|
Practical malware analysis : the hands-on guide to dissecting malicious software
by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.84 SIK] (1).
|
|
409.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
410.
|
Listening in : cybersecurity in an insecure age
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.168 LAN] (1).
|
|
411.
|
DNS security management
by Dooley, Michael | Rooney, Timothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
|
|
412.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
413.
|
Digital fortress
by Brown, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Transworld publishers, 1998Availability: Items available for loan: [Call number: 813.54 BRO] (1).
|
|
414.
|
Principles of secure processor architecture design
by Szefer, Jakub. Material type: Book Publisher: S.l. Morgan & Claypool 2019Availability: Items available for loan: [Call number: 004.22 SZE] (1).
|
|
415.
|
Malware data science : attack detection and attribution
by Saxe, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).
|
|
416.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
417.
|
Circuits and systems for security and privacy
by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
|
|
418.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
419.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
420.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|