|
241.
|
Security in RFID and sensor networks
by Zhang, Yan | Kitsos, Paris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 681.2 ZHA] (1).
|
|
242.
|
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
|
|
243.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
244.
|
Architecting secure software systems
by Talukder, Asoke K | Chaitanya, Manish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
|
|
245.
|
Remote sensing of global croplands for food security
by Thenkabail, Prasad S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 631.587 THE] (1).
|
|
246.
|
Security in an IPv6 environment
by Minoli, Daniel | Kouns, Jake. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 MIN] (1).
|
|
247.
|
IT risk : turning business threats into competitive advantage
by Westerman, George | Hunter, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Harvard Business School Press, 2007Availability: Items available for loan: [Call number: 658.4038 WES] (1).
|
|
248.
|
Pro PHP security : from application security principles to the implementation of XSS defenses
by Snyder, Chris | Myer, Tom | Southwell, Michael G. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Apress, 2010Availability: Items available for loan: [Call number: 005.133 SNY] (1).
|
|
249.
|
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson | Singer, Bryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.478 MAC] (1).
|
|
250.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
251.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|
|
252.
|
Communication system security
by Chen, Lidong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 621.38928 CHE] (1).
|
|
253.
|
Smart grid security : an end-to-end view of security in the new electrical grid
by Sorebo, Gilbert N | Echols, Michael C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 621.319 SOR] (1).
|
|
254.
|
Anonymous communication networks : protecting privacy on the web
by Peng, Kun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 PEN] (1).
|
|
255.
|
Encryption for digital content
by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
|
|
256.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
257.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
258.
|
Security and privacy in social networks
by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
|
|
259.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
260.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|