1101. Social networks with rich edge semantics

by Zheng, Quan | Skillicorn, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2017Availability: Items available for loan: [Call number: 302.3015118 ZHE] (1).
1102. Introduction to machine learning with applications in information security

by Stamp, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2018Availability: Items available for loan: [Call number: 004.6 STA] (1).
1103. SCION : a secure internet architecture

by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
1104. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
1105. Computer systems : digital design, fundamentals of computer architecture and assembly language

by Elahi, Ata.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.382 ELA] (1).
1106. Green photonics and electronics

by Eisenstein, Gadi | Bimberg, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerlands Springer 2018Availability: Items available for loan: [Call number: 621.36 EIS] (1).
1107. Introduction to deep learning : from logical calculus to artificial intelligence

by Skansi, Sandro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 006.3 SKA] (1).
1108. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
1109. Deep neural networks in a mathematical framework

by Caterini, Anthony L | Chang, Dong Eui.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 006.32 CAT] (1).
1110. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
1111. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
1112. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
1113. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
1114. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
1115. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
1116. Implementing SSL/​TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
1117. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
1118. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
1119. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
1120. Massive MIMO networks : spectral, energy, and hardware efficiency

by BjoÌrnson, Emil | Hoydis, Jakob | Sanguinetti, Luca.

Publisher: Hanover, USA Now Publishers 2018Availability: No items available Checked out (1).

Powered by Koha