|
601.
|
IEEE International Conference on Multimedia Computing and System, June 7-11, 1999
by IEEE Computer Society. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Computer Society, 1999Availability: Items available for loan: [Call number: 006.7 IEE] (2).
|
|
602.
|
13th IEEE Computer Security Foundations Workshop
by Titsworth, Frances M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
|
|
603.
|
Secure broadcast communication in wired and wireless networks
by Perrig, Adrian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.382 PER] (1).
|
|
604.
|
Towards a quarter-century of public key cryptography
by Koblitz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
|
|
605.
|
Failed states : the abuse of power and the assault on democracy
by Chomsky, Noam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Metropolitan Books, 2006Availability: Items available for loan: [Call number: 327.730090511 CHO] (1).
|
|
606.
|
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
|
|
607.
|
Cryptography : an introduction
by Yashchenko, V. V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2002Availability: Items available for loan: [Call number: 005.82 YAS] (1).
|
|
608.
|
Wireless Internet Handbook : technologies, standards, and applications
by Furht, Borko | Ilyas, Mohammad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 004.678 FUR] (1).
|
|
609.
|
Database and applications security : integrating information security and data management
by Thuraisingham, Bhavani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 THU] (1).
|
|
610.
|
Grid database design
by Wells, April J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 004.36 WEL] (1).
|
|
611.
|
Introduction to security and network forensics
by Buchanan, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: [Call number: 005.8 BUC] (1).
|
|
612.
|
Security in sensor networks
by Xiao, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 681.2 XIA] (1).
|
|
613.
|
Security in distributed, grid, mobile, and pervasive computing
by Xiao, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
|
|
614.
|
Security of mobile communications
by Boudriga, Noureddine. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: [Call number: 621.384 BOU] (1).
|
|
615.
|
Resource, mobility, and security management in wireless networks and mobile communications
by Zhang, Yan | Fujise, Masayuki | Hu, Honglin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 621.384 ZHA] (1).
|
|
616.
|
Security in wireless mesh networks
by Zhang, Yan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
|
|
617.
|
Wireless security and cryptography : specifications and implementations
by Zhang, Xinmiao | Sklavos, Nicolas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).
|
|
618.
|
Security for mobility
by Mitchell, Chris J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2004Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
619.
|
Trusted computing
by Mitchell, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
620.
|
Identity and security : a common architecture & framework for SOA and network convergence
by Radhakrishnan, Rakesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Futuretext, 2007Availability: Items available for loan: [Call number: 621.382 RAD] (1).
|