|
101.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
102.
|
Access control systems : security, identity management and trust models
by Benantar, Messaoud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
|
|
103.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|
|
104.
|
Wireless networks : multiuser detection in cross-layer design
by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
|
|
105.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
106.
|
Wireless network security
by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
|
|
107.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|
|
108.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
109.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
110.
|
Handbook of database security : applications and trends
by Jajodia, Sushil | Gertz, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
111.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
112.
|
Botnet detection : countering the largest security threat
by Lee, Wenke | Dagon, David | Wang, Cliff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
113.
|
Network-aware security for group communications
by Sun, Yan | Liu, K. J. R | Trappe, Wade. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SUN] (1).
|
|
114.
|
New approaches for security, privacy and trust in complex environments
by Venter, Hein | IFIP TC11 International Information Security Conference. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
|
|
115.
|
Network security
by Huang, Scott C | Du, Ding-Zhu | MacCallum, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
116.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
117.
|
Secure multi-party non-repudiation protocols and applications
by Onieva, Jose A | Lopez, Javier | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
|
|
118.
|
Intrusion detection systems
by Di Pietro, Roberto | Mancini, Luigi V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
|
|
119.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
120.
|
Future of identity in the information society
by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|