|
61.
|
Encyclopedia of cryptography and security
by Tilborg, Henk C. A. van. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
|
|
62.
|
Privacy-preserving data mining : models and algorithms
by Aggarwal, Charu C | Yu, Philip S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
|
|
63.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
64.
|
Fifth world conference on information security education: proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States military academy, west point, New York, USA
by Dodge, Ronald | Futcher, Lynn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8073 FUT] (1).
|
|
65.
|
Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
|
|
66.
|
Smart card applications : design models for using and programming smart cards
by Rankl, Wolfgang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.56 RAN] (1).
|
|
67.
|
Cryptology unlocked
by Wobst, Reinhard | Shafir, Angelika. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
|
|
68.
|
Essential maths for geoscientists : an introduction
by Palmer, Paul I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley-Blackwell, 2014Availability: Items available for loan: [Call number: 510.2455 PAL] (1).
|
|
69.
|
Cryptography and E-Commerce
by Graff, Jon C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 GRA] (1).
|
|
70.
|
Steganography in digital media : principles, algorithms, and applications
by Fridrich, Jessica. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2010Availability: Items available for loan: [Call number: 005.82 FRI] (1).
|
|
71.
|
Silicon jungle : a novel of deception, power, and internet intrigue
by Baluja, Shumeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2011Availability: Items available for loan: [Call number: 813.6 BAL] (1).
|
|
72.
|
Privacy, information and technology
by Solove, Daniel J | Schwartz, Paul M. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Aspen Publishers, 2008Availability: Items available for loan: [Call number: 342.730858 SOL] (1).
|
|
73.
|
Thinking about cultural resource management : essays from the edge
by King, Thomas F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lanham: Rowman & Littlefield Publishers, 2002Availability: Items available for loan: [Call number: 363.690973 KIN] (1).
|
|
74.
|
Global Software Development
by Karolak, Dale Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: IEEE Computer Society, 1998Availability: Items available for loan: [Call number: 005.1 KAR] (1).
|
|
75.
|
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
|
|
76.
|
Informed watermarking
by Eggers, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
|
|
77.
|
Multimedia content encryption : techniques and applications
by Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
|
|
78.
|
Digital imaging for cultural heritage preservation : analysis, restoration, and reconstruction of ancient artworks
by Stanco, Filippo | Battiato, Sebastiano | Gallo, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 006.6 STA] (1).
|
|
79.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|
|
80.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|