|
161.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
162.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
163.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
164.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
165.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
166.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
167.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
168.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
169.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
170.
|
Security for mobile networks and platforms
by Aissi, Selim | Dabbous, Nora | Prasad, Anand R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
|
|
171.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
172.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
173.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
174.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
175.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
176.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
177.
|
Web services security development and architecture : theoretical and practical issues
by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
|
|
178.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
179.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan | Slamanig, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
180.
|
Embedded Java security : security for mobile devices
by Debbabi, Mourad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
|