|
221.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
222.
|
Computer network security : theory and practice
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
223.
|
Security for web services and service-oriented architectures
by Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
|
|
224.
|
Security access in wireless local area networks: from architecture and protocols to realization
by Ma, Jianfeng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 MAJ] (1).
|
|
225.
|
E-Technologies : innovation in an open world
by Babin, Gilbert | Kropf, Peter | Weiss, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2009Availability: Items available for loan: [Call number: 658.4038 BAB] (1).
|
|
226.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
227.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|
|
228.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
229.
|
Mobile hybrid intrusion detection : the MOVICAB-IDS system
by Herrero, Alvaro | Corchado, Emilio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 HER] (1).
|
|
230.
|
Collaborative financial infrastructure protection : tools, abstractions, and middleware
by Baldoni, Roberto | Chockler, Gregory. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
231.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
232.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
233.
|
Information systems security : security management, metrics, frameworks and best practices
by Godbole, Nina S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
|
|
234.
|
Network security : a practical approach
by Harrington, Jan L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
235.
|
How to cheat at configuring Open Source security tools
by Alder, Raven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 ALD] (1).
|
|
236.
|
Protecting your PC
by Barile, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
|
|
237.
|
Network infrastructure security
by Weaver, Randy | Weaver, Dawn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
|
|
238.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
239.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
240.
|
Information security : a practical approach
by Bhaskar, S. M | Ahson, S. I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
|