|
21.
|
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers
by Chae, Kijoon | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
|
|
22.
|
Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings
by Jonker, Willem | Petkovic, Milan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
|
|
23.
|
Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers
by Lim, Chae Hoon | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
|
|
24.
|
Digital Rights Management : Technological, Economic, Legal and Political Aspects
by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
|
|
25.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
26.
|
Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
by Moskowitz, I. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
|
|
27.
|
Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings
by Davida, George | Frankel, Yair | Rees, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
|
|
28.
|
Information Security and Privacy
by Pieprzyk, Josef | Seberry, Jennifer. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
|
|
29.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
30.
|
Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings
by Aucsmith, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
|
|
31.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
32.
|
International conference on information security, ICIS-2005, December 7-9, 2005, proceedings
by Aghila, G | Gnanadass, R | Pondicherry Engineering College, Pondicherry | Sudha, Gnanou Florence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Allied Publishers, 2005Availability: Items available for loan: [Call number: 005.8 AGH] (1).
|
|
33.
|
Software forensics : collecting evidence from the scene of a digital crime
by Slade, Robert M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
34.
|
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey | Shoemaker, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
35.
|
Computer security lab manual
by Nestler, Vincent J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
|
|
36.
|
Hacking exposed Cisco networks : Cisco security secrets & solutions
by Vladimirov, Andrew A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
37.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
38.
|
Computer security : 20 things every employee should know
by Rothke, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
|
|
39.
|
Digital watermarking and steganography
by Cox, Ingemar J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
|
|
40.
|
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
by Skoudis, Ed | Liston, Tom. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|