21. Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding

by Lioy, Antonio | Mazzocchi, Daniele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
22. Security in ad-hoc and Sensor Networks : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004 ; revised selected papers

by Hartenstein, Hannes | Castelluccia, Claude | Paar, Christof | Westhoff, Dirk.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 CAS] (1).
23. Digital Rights Management : Technological, Economic, Legal and Political Aspects

by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
24. Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings

by Vigna, Giovanni | Jonsson, Erland | Kruegel, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 VIG] (1).
25. Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

by Moskowitz, I. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
26. Computer safety, reliability, and security : 21st international conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002 : proceedings

by Anderson, Stuart | Bologna, Sandro | Felici, Massimo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 AND] (1).
27. Information Security and Privacy

by Pieprzyk, Josef | Seberry, Jennifer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
28. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
29. Decrypted Secrets

by Bauer, Friedrich L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
30. Security engineering : a guide to building dependable distributed systems

by Anderson, Ross J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 AND] (1).
31. Building VPNs with IPSec and MPLS

by Tan, Nam-Kee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
32. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
33. Digital signatures

by Atreya, Mohan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
34. Gray hat hacking : the ethical hacker's handbook

by Harris, Shon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
35. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
36. Nineteen deadly sins of software security : programming flaws and how to fix them

by Howard, Michael | LeBlanc, David | Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill/Osborne, 2005Availability: Items available for loan: [Call number: 005.8 HOW] (1).
37. Computer security : 20 things every employee should know

by Rothke, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
38. Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W | Friedman, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
39. Web Security

by Stein, Lincoln D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
40. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).

Powered by Koha