|
301.
|
Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting.
by Cole, Peter H | Ranasinghe, Damith C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 621.384 COL] (1).
|
|
302.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
303.
|
Computer network security : theory and practice
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
304.
|
Security for web services and service-oriented architectures
by Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
|
|
305.
|
Security access in wireless local area networks: from architecture and protocols to realization
by Ma, Jianfeng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 MAJ] (1).
|
|
306.
|
E-Technologies : innovation in an open world
by Babin, Gilbert | Kropf, Peter | Weiss, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2009Availability: Items available for loan: [Call number: 658.4038 BAB] (1).
|
|
307.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
308.
|
Quantum private communication
by Zeng, Guihua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
309.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|
|
310.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
311.
|
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings
by Mathuria, Anish | Jha, Somesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
|
|
312.
|
Mobile hybrid intrusion detection : the MOVICAB-IDS system
by Herrero, Alvaro | Corchado, Emilio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 HER] (1).
|
|
313.
|
Collaborative financial infrastructure protection : tools, abstractions, and middleware
by Baldoni, Roberto | Chockler, Gregory. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
314.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
315.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
316.
|
E-mail hacking : learn e-mail hacking the easy way
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Vikas Publishing House, 2006Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
317.
|
Information systems security : security management, metrics, frameworks and best practices
by Godbole, Nina S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
|
|
318.
|
Network security : a practical approach
by Harrington, Jan L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
319.
|
VoIP security
by Ransome, James F | Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 005.8 RAN] (1).
|
|
320.
|
How to cheat at configuring Open Source security tools
by Alder, Raven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 ALD] (1).
|