141. Network security

by Huang, Scott C | Du, Ding-Zhu | MacCallum, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
142. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
143. Secure multi-party non-repudiation protocols and applications

by Onieva, Jose A | Lopez, Javier | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
144. Intrusion detection systems

by Di Pietro, Roberto | Mancini, Luigi V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
145. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
146. Future of identity in the information society

by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
147. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
148. Elsevier's dictionary of information security in English, German, French and Russian

by Radichkova, B | Manoilov, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
149. Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence

by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
150. Security in wireless ad hoc and sensor networks

by Cayirci, Erdal | Rong, Chunming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
151. Policy-driven mobile ad hoc network management

by Chadha, Ritu | Kant, Lahta.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
152. Network security fundamentals

by Reese, Rachelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
153. Networking Basics

by Ciccarelli, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 004.6 CIC] (1).
154. Implementing 802.1X security solutions for wired and wireless networks

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
155. Security of information and communication networks

by Kartalopoulos, Stamatios V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
156. Schneier on security

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
157. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
158. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
159. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
160. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).

Powered by Koha