|
661.
|
Handbook of finite fields
by Mullen, Gary L | Panario, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.3 MUL] (1).
|
|
662.
|
Anonymous communication networks : protecting privacy on the web
by Peng, Kun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 PEN] (1).
|
|
663.
|
Hardware security : design, threats, and safeguards
by Mukhopadhyay, Debdeep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
|
|
664.
|
Encryption for digital content
by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
|
|
665.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
666.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
667.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
668.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
669.
|
Hackers
by Levy, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
|
|
670.
|
Computer science illuminated
by Dale, Nell | Lewis, John. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Jones & Bartlett, 2013Availability: Items available for loan: [Call number: 004 DAL] (1).
|
|
671.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
672.
|
Security and privacy in social networks
by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
|
|
673.
|
Physical unclonable functions in theory and practice
by Hofer, Maximilian | Bohm, Christoph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.3815 BOH] (1).
|
|
674.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
675.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
676.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
677.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
678.
|
Secure messaging with PGP and S/MIME
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
679.
|
Security technologies for the world wide web
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
680.
|
Computer and intrusion forensics
by Mohay, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
|