|
621.
|
Computer architecture and security fundamentals of designing secure computer systems
by Wang, Shuangbao Paul | Ledley, Robert S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
622.
|
Web application security : a beginner's guide
by Sullivan, Bryan | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2012Availability: Items available for loan: [Call number: 006.78 SUL] (1).
|
|
623.
|
Data Communications and Networking
by Forouzan, Behrouz A. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: McGraw-Hill Education India, 2013Availability: Items available for loan: [Call number: 004.6 FOR] (2).
|
|
624.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
625.
|
Physics for medical imaging applications
by Lemoigne, Yves | Caner, Alessandra | Rahal, Ghita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2007Availability: Items available for loan: [Call number: 616.0754 LEM] (1).
|
|
626.
|
Informed watermarking
by Eggers, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
|
|
627.
|
Sensors for environment, health and security : advanced materials and technologies
by Baraton, Marie-Isabelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
|
|
628.
|
Sensors for environment, health and security : advanced materials and technologies
by Baraton, Marie-Isabelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
|
|
629.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
630.
|
Social policy in the modern world : a comparative text
by Hill, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Malden: Blackwell, 2006Availability: Items available for loan: [Call number: 320.6 HIL] (1).
|
|
631.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
632.
|
Computer system security : basic concepts and solved exercises
by Avoine, Gildas | Junod, Pascal | Oechslin, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 AVO] (1).
|
|
633.
|
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
by Brancik, Kenneth C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
634.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
635.
|
Data-driven block ciphers for fast telecommunication systems
by Moldovyan, Nikolay A | Moldovyan, Alexander A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
|
|
636.
|
Handbook of financial cryptography and security
by Rosenberg, Burton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
|
|
637.
|
Understanding and applying cryptography and data security
by Elbirt, Adam J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
|
|
638.
|
Multimedia content encryption : techniques and applications
by Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
|
|
639.
|
Grid computing : infrastructure, service, and applications
by Wang, Lizhe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 004.36 WAN] (1).
|
|
640.
|
Security in RFID and sensor networks
by Zhang, Yan | Kitsos, Paris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 681.2 ZHA] (1).
|