1. Internet denial of service : attack and defense mechanisms

by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
2. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
3. Humanscale 7/8/9 : portfolio of information

by Diffrient, Niels | Harman, David | Tilley, Alvin R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 1991Availability: Items available for loan: [Call number: 620.82 DIF] (1).
4. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
5. Beyond fear : thinking sensibly about security in an uncertain world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Copernicus Books, 2003Availability: Items available for loan: [Call number: 363.3221 SCH] (1).
6. 9/11 commission report : final report of the national commission on terrorist attacks upon the United States

by Hamilton, Lee H | Ben-Veniste, Richard | Kean, Thomas H | Kerrey, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: W. W. Norton & Company, 2004Availability: Items available for loan: [Call number: 973.931 KEA] (1).
7. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
8. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
9. Countering the new terrorism

by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).
10. Communicable disease : epidemiology and control

by Webber, Roger.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: CABI, 1996Availability: Items available for loan: [Call number: 616.9 WEB] (1).
11. Design criteria for low distortion in feedback opamp circuits

by Saether, Trond | Hernes, Bjornar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.395 HER] (1).
12. Parasitic-aware optimization of CMOS RF circuits

by Allstot, David J | Choi, Kiyong | Park, Jinho.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.38412 ALL] (1).
13. Multi-threshold CMOS digital circuits : managing leakage power

by Elmasry, Mohamed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic, 2003Availability: Items available for loan: [Call number: 621.39732 ANI] (1).
14. Protect Your Child on the Internet : a parent's toolkit

by Lenardon, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Viva Books, 2007Availability: Items available for loan: [Call number: 004.6780289 LEN] (2).
15. Waste minimization : a practical guide to cleaner production and enhanced profitability

by Modak, Prasad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Ahmedabad: Centre for Environment Education, 1995Availability: Items available for loan: [Call number: 363.728 MOD] (1).
16. Safe : the race to protect ourselves in a newly dangerous world

by Baer, Martha | Heron, Katrina | Morton, Oliver | Ratliff, Evan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: HarperCollins, 2005Availability: Items available for loan: [Call number: 363.32 BAE] (1).
17. Endangered species : how we can avoid mass destruction and build a lasting peace

by Younger, Stephen Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: HarperPerennial, 2008Availability: Items available for loan: [Call number: 303.6 YOU] (1).
18. Cyber attacks : protecting national infrastructure

by Amoroso, Edward G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
19. Software IP detective's handbook : measurement, comparison, and infringement detection

by Zeidman, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 346.048 ZEI] (1).
20. White man's burden : why the West's efforts to aid the rest have done so much ill and so little good

by Easterly, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2007Availability: Items available for loan: [Call number: 338.911713 EAS] (1).

Powered by Koha