|
901.
|
Principles of secure processor architecture design
by Szefer, Jakub. Material type: Book Publisher: S.l. Morgan & Claypool 2019Availability: Items available for loan: [Call number: 004.22 SZE] (1).
|
|
902.
|
Malware data science : attack detection and attribution
by Saxe, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).
|
|
903.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
904.
|
Android security internals : an in-depth guide to Android's security architecture
by Elenkov, Nikolay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco : No Starch Press, 2015Availability: Items available for loan: [Call number: 004.1675 ELE] (1).
|
|
905.
|
Circuits and systems for security and privacy
by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
|
|
906.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
907.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
908.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
909.
|
Understanding high-dimensional spaces
by Skillicorn, David B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.312 SKI] (1).
|
|
910.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
911.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
912.
|
Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications
by Möller, Dietmar P. F | Haas, Roland E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
|
|
913.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
914.
|
Bitcoin and blockchain security
by Karame, Ghassan | Androulaki, Elli. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Artech House, 2016Availability: Items available for loan: [Call number: 332.178 KAR] (1).
|
|
915.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
916.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
917.
|
Security of block ciphers : from algorithm design to hardware implementation
by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
918.
|
Hungry nation : food, famine, and the making of modern India
by Siegel, Benjamin Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Cambridge university press, 2018Availability: Items available for loan: [Call number: 338.10954 SIE] (1).
|
|
919.
|
Implementing SSL/TLS using cryptography and PKI
by Davies, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
920.
|
On privacy-preserving protocols for smart metering systems : security and privacy in smart grids
by Borges de Oliveira, Fábio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 621.3191 BOR] (1).
|