|
721.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan | Slamanig, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
722.
|
Steganography and watermarking
by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
723.
|
Future of the Internet and How to Stop it
by Zittrain, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Penguin Books, 2008Availability: Items available for loan: [Call number: 004.6780112 ZIT] (1).
|
|
724.
|
Information Assurance
by Blyth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
|
|
725.
|
Peer-to-Peer Computing : building supercomputers with Web technologies
by Loo, Alfred Wai-Sing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 004.65 LOO] (1).
|
|
726.
|
Embedded Java security : security for mobile devices
by Debbabi, Mourad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
|
|
727.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
728.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
729.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
730.
|
Cloud computing : assessing the risks
by Carstensen, Jared | Golden, Bernard | Morgenthal, J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Emeryville: IT Governance Publishing, 2012Availability: Items available for loan: [Call number: 004.6782 CAR] (1).
|
|
731.
|
Professional ASP. NET security
by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
|
|
732.
|
Visual Basic .Net code security handbook
by Lippert, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.2768 LIP] (1).
|
|
733.
|
Electronic projects for home security
by Bishop, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: BPB Publications, 1992Availability: Items available for loan: [Call number: 621.38928 BIS] (1).
|
|
734.
|
Fundamentals of secure computer systems
by Tjaden, Brett C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wilsonville: Franklin Beedle & Associates, 2004Availability: Items available for loan: [Call number: 005.8 TJA] (1).
|
|
735.
|
Gandhi and Bengal : a descriptive chronology
by Gandhi, Gopalkrishna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Seagull Books, 2007Availability: Items available for loan: [Call number: 954.9202092 GAN] (1).
|
|
736.
|
Wireless hacking : projects for wi-fi enthusiasts
by Barken, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
737.
|
Trusted computing for embedded systems
by Candaele, Bernard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8 CAN] (1).
|
|
738.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
739.
|
Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003 Belfast, Northern Ireland, UK, September 7-10, 2003: Proceedings
by Marshall, Alan | Agoulmine, Nazim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 MAR] (1).
|
|
740.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|