21. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
22. Computer architecture and security fundamentals of designing secure computer systems

by Wang, Shuangbao Paul | Ledley, Robert S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
23. Quantum magnetism

by Barbara, B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2008Availability: Items available for loan: [Call number: 538 BAR] (1).
24. Sensors for environment, health and security : advanced materials and technologies

by Baraton, Marie-Isabelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
25. Sensors for environment, health and security : advanced materials and technologies

by Baraton, Marie-Isabelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
26. Electronic payment systems for E-commerce

by O'Mahony, Donal.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 OMA] (1).
27. Java card for E-payment applications

by Hassler, Vesna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.133 HAS] (1).
28. Implementing electronic card payment systems

by Radu, Cristian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 RAD] (1).
29. Security technologies for the world wide web

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
30. Computer and intrusion forensics

by Mohay, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
31. Wireless sensor network security

by Zhou, Jianying | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
32. Aspects of network and information security

by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
33. Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web

by Last, Mark | Kandel, Abraham.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
34. Software and systems safety : specification and verification

by Broy, Manfred | Hoare, Tony | Leuxner, Christian | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.8 BRO] (1).
35. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
36. Techniques for designing and analyzing algorithms

by Stinson, Douglas R.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 518.1 STI] (1).
37. Practical mathematical cryptography

by Gjosteen, Kristian.

Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).

Powered by Koha