|
21.
|
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by Lioy, Antonio | Mazzocchi, Daniele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
|
|
22.
|
Security in ad-hoc and Sensor Networks : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004 ; revised selected papers
by Hartenstein, Hannes | Castelluccia, Claude | Paar, Christof | Westhoff, Dirk. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 CAS] (1).
|
|
23.
|
Digital Rights Management : Technological, Economic, Legal and Political Aspects
by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
|
|
24.
|
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings
by Vigna, Giovanni | Jonsson, Erland | Kruegel, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 VIG] (1).
|
|
25.
|
Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
by Moskowitz, I. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
|
|
26.
|
Computer safety, reliability, and security : 21st international conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002 : proceedings
by Anderson, Stuart | Bologna, Sandro | Felici, Massimo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
27.
|
Information Security and Privacy
by Pieprzyk, Josef | Seberry, Jennifer. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
|
|
28.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
29.
|
Decrypted Secrets
by Bauer, Friedrich L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
|
|
30.
|
Security engineering : a guide to building dependable distributed systems
by Anderson, Ross J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 AND] (1).
|
|
31.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
32.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
33.
|
Digital signatures
by Atreya, Mohan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
|
|
34.
|
Gray hat hacking : the ethical hacker's handbook
by Harris, Shon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
35.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
36.
|
Nineteen deadly sins of software security : programming flaws and how to fix them
by Howard, Michael | LeBlanc, David | Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill/Osborne, 2005Availability: Items available for loan: [Call number: 005.8 HOW] (1).
|
|
37.
|
Computer security : 20 things every employee should know
by Rothke, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
|
|
38.
|
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W | Friedman, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
39.
|
Web Security
by Stein, Lincoln D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
40.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|