|
561.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
562.
|
Information security : a strategic approach
by LeVeque, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
|
|
563.
|
Security for wireless ad-hoc networks
by Anjum, Farooq | Mouchtaris, Petros. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 ANJ] (1).
|
|
564.
|
Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers
by Mitnick, Kevin D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
|
|
565.
|
Data Communications and Networks
by Irvine, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.382 IRV] (1).
|
|
566.
|
Computer security and cryptography
by Konheim, Alan G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
|
|
567.
|
Physical-layer security : from information theory to security engineering
by Bloch, Matthieu | Barros, Joao. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2011Availability: Items available for loan: [Call number: 621.382 BLO] (1).
|
|
568.
|
Protecting information : from classical error correction to quantum cryptography
by Loepp, Susan | Wootters, William Kent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 004.1 LOE] (1).
|
|
569.
|
Elements of UML 2.0 style
by Ambler, Scott W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2005Availability: Items available for loan: [Call number: 005.1 AMB] (1).
|
|
570.
|
Elliptic curves in cryptography
by Blake, I. F | Seroussi, G | Smart, N. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
571.
|
Security of e-systems and computer networks
by Obaidat, Mohammad S | Boudriga, Noureddine A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2007Availability: Items available for loan: [Call number: 005.8 OBA] (1).
|
|
572.
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
by Buttyan, Levente | Hubaux, Jean-Pierre. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
|
|
573.
|
Security and quality of service in ad hoc wireless networks
by Mishra, Amitabh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
|
|
574.
|
Wireless Internet security : architecture and protocols
by Kempf, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
|
|
575.
|
Digital identity management : technological, business, and social implications
by Birch, David G. W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
|
|
576.
|
Secure programming cookbook for C and C++
by Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD/O'Reilly, 2003Availability: Items available for loan: [Call number: 005.133 VIE] (1).
|
|
577.
|
Security monitoring
by Fry, Chris | Nystrom, Martin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
|
|
578.
|
Myths of security : what the computer security industry doesn't want you to know
by Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 VIE] (1).
|
|
579.
|
Web security for network and system administrators
by Mackey, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
|
|
580.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|