201. VPNs illustrated : tunnels, VPNs, and IPsec

by Snader, Jon C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 004.678 SNA] (1).
202. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
203. Contemporary cryptology

by Catalano, Dario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Basel: Birkhauser Verlag, 2005Availability: Items available for loan: [Call number: 005.82 CAT] (1).
204. Microsoft Windows 2000 Security

by Internet Security System Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
205. Handbook of security, cryptography and digital signature

by Bhaskar, S. M | Ramachandran, P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
206. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
207. Progress in Cryptology -- INDOCRYPT 2003

by Johansson, Thomas | Maitra, Subhamoy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
208. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
209. Quantum computation and quantum information

by Nielsen, Michael A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Cambridge University Press 2010Availability: Items available for loan: [Call number: 004.1 NIE] (1).
210. Web security

by Chen, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
211. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
212. Real-World Algorithms : a beginner's guide

by Louridas, Panos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge; MIT Press: 2017Availability: Items available for loan: [Call number: 005.1 LOU] (1).
213. Bent functions : fundamentals and results

by Mesnager, Sihem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 511.324 MES] (1).
214. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
215. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
216. Turing guide

by Copeland, Jack | Bowen, Jonathan | Sprevak, Mark | Wilson, Robin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: United Kingdom: Oxford University Press, 2017Availability: Items available for loan: [Call number: 510.92 COP] (1).
217. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
218. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
219. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
220. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).

Powered by Koha