|
161.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|
|
162.
|
Power analysis attacks : revealing the secrets of smart cards
by Mangard, Stefan | Oswald, Elisabeth | Popp, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 MAN] (1).
|
|
163.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
164.
|
Secure localization and time synchronization for wireless sensor and ad hoc networks
by Poovendran, Radha. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
|
|
165.
|
Synchronizing Internet Protocol Security (SIPSec)
by Shoniregun, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 SHO] (1).
|
|
166.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
167.
|
Handbook of database security : applications and trends
by Jajodia, Sushil | Gertz, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
168.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
169.
|
Botnet detection : countering the largest security threat
by Lee, Wenke | Dagon, David | Wang, Cliff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
170.
|
Network-aware security for group communications
by Sun, Yan | Liu, K. J. R | Trappe, Wade. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SUN] (1).
|
|
171.
|
Smart cards, tokens, security and applications
by Mayes, Keith E | Markantonakis, Konstantinos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
172.
|
New approaches for security, privacy and trust in complex environments
by Venter, Hein | IFIP TC11 International Information Security Conference. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
|
|
173.
|
Trust Management
by Etalle, Sandro | Marsh, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
|
|
174.
|
Network security
by Huang, Scott C | Du, Ding-Zhu | MacCallum, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
175.
|
Wireless Communications : 2007 CNIT Thyrrenian Symposium
by Puppolin, Silvano. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.38438 PUP] (1).
|
|
176.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
177.
|
Secure multi-party non-repudiation protocols and applications
by Onieva, Jose A | Lopez, Javier | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
|
|
178.
|
Intrusion detection systems
by Di Pietro, Roberto | Mancini, Luigi V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
|
|
179.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
180.
|
Future of identity in the information society
by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|