21. Intrusion detection systems

by Di Pietro, Roberto | Mancini, Luigi V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
22. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
23. Electronic healthcare information security

by Dube, Kudakwashe | Mtenzi, Fredrick | Shoniregun, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 610.285 SHO] (1).
24. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
25. Encryption for digital content

by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
26. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
27. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
28. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
29. Applications of data mining in computer security

by Barbara, Daniel | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).

Powered by Koha