|
181.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
182.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
183.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
184.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
185.
|
Handbook of financial cryptography and security
by Rosenberg, Burton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
|
|
186.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
187.
|
Architecting secure software systems
by Talukder, Asoke K | Chaitanya, Manish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
|
|
188.
|
Networking systems design and development
by Chao, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
189.
|
Security in an IPv6 environment
by Minoli, Daniel | Kouns, Jake. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 MIN] (1).
|
|
190.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
191.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
192.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
193.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
194.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
195.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
196.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
197.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
198.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
199.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
200.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|