|
21.
|
Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
by Moskowitz, I. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
|
|
22.
|
Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings
by Davida, George | Frankel, Yair | Rees, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
|
|
23.
|
Information Security and Privacy
by Pieprzyk, Josef | Seberry, Jennifer. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
|
|
24.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
25.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
26.
|
International conference on information security, ICIS-2005, December 7-9, 2005, proceedings
by Aghila, G | Gnanadass, R | Pondicherry Engineering College, Pondicherry | Sudha, Gnanou Florence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Allied Publishers, 2005Availability: Items available for loan: [Call number: 005.8 AGH] (1).
|
|
27.
|
Software forensics : collecting evidence from the scene of a digital crime
by Slade, Robert M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
28.
|
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey | Shoemaker, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
29.
|
Computer security lab manual
by Nestler, Vincent J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
|
|
30.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
31.
|
Computer security : 20 things every employee should know
by Rothke, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
|
|
32.
|
Digital watermarking and steganography
by Cox, Ingemar J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
|
|
33.
|
Analyzing computer security : a threat/vulnerability/countermeasure approach
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
34.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
35.
|
Privacy-preserving data mining : models and algorithms
by Aggarwal, Charu C | Yu, Philip S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
|
|
36.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
37.
|
Informed watermarking
by Eggers, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
|
|
38.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|
|
39.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
40.
|
Computer and intrusion forensics
by Mohay, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
|