|
101.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
102.
|
Hash function BLAKE
by Aumasson, Jean-Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
|
|
103.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
104.
|
Encryption : protecting your data
by Fadia, Ankit | Bhattacharjee, Jaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
105.
|
Network Programming in .NET : with C# and Visual Basic .NET
by Reid, Fiach. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Digital Press, 2004Availability: Items available for loan: [Call number: 004.6 REI] (1).
|
|
106.
|
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof | Pelzl, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
|
|
107.
|
Internet 101
by Lehnert, Wendy G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 004.678 LEH] (1).
|
|
108.
|
SSH, the secure shell : the definitive guide
by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
109.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
|
|
110.
|
Coding theorems of classical and quantum information theory
by Parthasarathy, K. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Hindustan Book Agency, 2013Availability: Items available for loan: [Call number: 530.12 PAR] (1).
|
|
111.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
112.
|
Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings
by Snekkenes, Einar | Gollmann, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 SNE] (1).
|
|
113.
|
Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers
by Johansson, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
|
|
114.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
115.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
116.
|
Secure data deletion
by Reardon, Joel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
|
|
117.
|
Symmetric cryptographic protocols
by Ramkumar, Mahalingam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
|
|
118.
|
Listening in : cybersecurity in an insecure age
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.168 LAN] (1).
|
|
119.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
120.
|
Random numbers and computers
by Kneusel, Ronald T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518 KNE] (1).
|