101. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
102. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
103. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
104. Encryption : protecting your data

by Fadia, Ankit | Bhattacharjee, Jaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
105. Network Programming in .NET : with C# and Visual Basic .NET

by Reid, Fiach.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Digital Press, 2004Availability: Items available for loan: [Call number: 004.6 REI] (1).
106. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
107. Internet 101

by Lehnert, Wendy G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 004.678 LEH] (1).
108. SSH, the secure shell : the definitive guide

by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
109. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
110. Coding theorems of classical and quantum information theory

by Parthasarathy, K. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Hindustan Book Agency, 2013Availability: Items available for loan: [Call number: 530.12 PAR] (1).
111. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
112. Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

by Snekkenes, Einar | Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 SNE] (1).
113. Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers

by Johansson, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
114. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
115. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
116. Secure data deletion

by Reardon, Joel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
117. Symmetric cryptographic protocols

by Ramkumar, Mahalingam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
118. Listening in : cybersecurity in an insecure age

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.16​8 LAN] (1).
119. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
120. Random numbers and computers

by Kneusel, Ronald T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518 KNE] (1).

Powered by Koha