|
1.
|
Crypto : how the code rebels beat the government - saving privacy in the digital age
by Levy, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
|
|
2.
|
Computer, ethics, and society
by Ermann, M. David | Ermann, M. David | Shauf, Michele | Shauf, Michele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 303.4834 ERM] (1).
|
|
3.
|
Protecting critical infrastructures against cyber-attack
by Goodman, Seymour E | Longhurst,David W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
|
|
4.
|
Brute force : cracking the data encryption standard
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
|
|
5.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
6.
|
Trusted computing platforms : design and applications
by Smith, Sean W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
7.
|
Computer Security in the 21st Century
by Shieh, S. P | Lee, D. T | Tygar, J. D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
8.
|
Multimedia encryption and watermarking
by Furht, Borko | Muharemagic, Edin | Socek, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
|
|
9.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
10.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
11.
|
Computer security handbook
by Bosworth, Seymour | Kabay, M. E. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
|
|
12.
|
Load Balancing Servers, Firewalls and Caches
by Kopparapu, Chandra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
|
|
13.
|
Unwanted gaze : a dictionary of privacy in America
by Rosen, Jeffrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
|
|
14.
|
Contemporary cryptology : the science of information integrity
by Simmons, Gustavus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
|
|
15.
|
Statistical methods in computer security
by Chen, William W. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
16.
|
Enhanced methods in computer security, biometric and artificial intelligence systems
by Piegat, Andrzej | Pejas, Jerzy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Kluwer Academic Publishers, 2005Availability: Items available for loan: [Call number: 005.8 PEJ] (1).
|
|
17.
|
Digital privacy : theory, technologies, and practices
by Acquisti, Alessandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
|
|
18.
|
Secure Systems Development with UML
by Jurjens, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).
|
|
19.
|
Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings
by Qing, Sihan | Gollmann, Dieter | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 QIN] (1).
|
|
20.
|
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by Boyd, Colin | Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
|