|
681.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
682.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
683.
|
Codes : the guide to secrecy from ancient to modern times
by Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
|
|
684.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|
|
685.
|
Wireless sensor network security
by Zhou, Jianying | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
|
|
686.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
687.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
688.
|
Securing the borderless network : security for the web 2.0 world
by Gillis, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2010Availability: Items available for loan: [Call number: 005.8 GIL] (1).
|
|
689.
|
Foundations of security : what every programmer needs to know
by Daswani, Neil | Kern, Christoph | Kesavan, Anita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
|
|
690.
|
What every librarian should know about electronic privacy
by Woodward, Jeannette. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
|
|
691.
|
Network Security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan, 2003Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
692.
|
Linux firewalls : attack detection and response with iptables, psad, and fwsnort
by Rash, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
693.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
694.
|
Tangled Web : a guide to securing modern Web applications
by Zalewski, Michal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.8 ZAL] (1).
|
|
695.
|
Security for mobile networks and platforms
by Aissi, Selim | Dabbous, Nora | Prasad, Anand R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
|
|
696.
|
Delay-and Disruption-Tolerant Networking
by Farrell, Stephen | Cahill, Vinny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
|
|
697.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
698.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
699.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
700.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|