|
181.
|
Secure key establishment
by Choo, Kim-Kwang Raymond. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
|
|
182.
|
Securing emerging wireless systems : lower-layer approaches
by Chen, Yingying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.384 CHE] (1).
|
|
183.
|
Guide to wireless network security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
184.
|
Modern cryptology : a tutorial
by Brassard, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
|
|
185.
|
Elsevier's dictionary of information security in English, German, French and Russian
by Radichkova, B | Manoilov, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
|
|
186.
|
Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
|
|
187.
|
Security in wireless ad hoc and sensor networks
by Cayirci, Erdal | Rong, Chunming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
|
|
188.
|
Network security fundamentals
by Reese, Rachelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
|
|
189.
|
Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise
by Hoffman, Daniel V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
|
|
190.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|
|
191.
|
Web application hacker?s handbook : discovering and exploiting security flaws
by Stuttard, Dafydd. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
|
|
192.
|
Security of information and communication networks
by Kartalopoulos, Stamatios V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
|
|
193.
|
Schneier on security
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
|
|
194.
|
Distributed systems security : issues, processes and solutions
by Belapurkar, Abhijit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.8 BEL] (1).
|
|
195.
|
Cellular authentication for mobile and internet services
by Holtmanns, Silke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 HOL] (1).
|
|
196.
|
Security in a Web 2.0+ world : a standards based approach
by Solari, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
197.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
198.
|
Innocent code : a security wake up call for Web programmers.
by Huseby, Sverre H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
|
|
199.
|
Host Identity Protocol (HIP) : towards the secure mobile Internet
by Gurtov, Andrei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 GUR] (1).
|
|
200.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|