|
21.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
22.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
23.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
24.
|
Security for wireless sensor networks
by Liu, Donggang | Ning, Peng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
|
|
25.
|
AA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
by Nakhjiri, Madjid | Nakhjiri, Mahsa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 NAK] (1).
|
|
26.
|
Internet security : cryptographic principles, algorithms, and protocols
by Rhee, Man Young. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
|
|
27.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
28.
|
Building open source network security tools : components and techniques
by Schiffman, Mike D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
29.
|
Wireless security essentials : defending mobile systems from data piracy
by Vines, Russell Dean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
|
|
30.
|
Computer security handbook
by Bosworth, Seymour | Kabay, M. E. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
|
|
31.
|
Implementing SSH : strategies for optimizing the secure shell
by Dwivedi, Himanshu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
32.
|
Cryptography, information theory, and error-correction : a handbook for the twenty first century
by Bruen, Aiden A | Forcinito, Mario A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
33.
|
PC pest control : protect your computers from malicious internet invaders.
by Gralla, Preston. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
|
|
34.
|
Peter Norton's network security fundamentals
by Norton, Peter | Stockman, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
|
|
35.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
36.
|
Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption
by Remy, David | Rosenberg, Jothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
|
|
37.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
38.
|
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security
by Chandra, Praphul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
39.
|
Contemporary cryptology : the science of information integrity
by Simmons, Gustavus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
|
|
40.
|
Countering the new terrorism
by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).
|