201. Security for mobile networks and platforms

by Aissi, Selim | Dabbous, Nora | Prasad, Anand R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
202. Delay-and Disruption-Tolerant Networking

by Farrell, Stephen | Cahill, Vinny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
203. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
204. SSL and TLS : theory and practice

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
205. How to own a shadow : the chase for Knuth

by Long, Johnny | Mullen, Timothy M | Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
206. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
207. Network and system security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
208. Securing the cloud : cloud computer security techniques and tactics

by Winkler, Vic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
209. Cyber warfare : techniques, tactics and tools for security practitioners

by Andress, Jason | Winterfeld, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
210. Web services security development and architecture : theoretical and practical issues

by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
211. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
212. Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamanig, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
213. Embedded Java security : security for mobile devices

by Debbabi, Mourad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
214. Guide to computer network security

by Kizza, Joseph Migga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
215. Intrusion detection : a machine learning approach

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
216. Professional ASP. NET security

by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
217. Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003 Belfast, Northern Ireland, UK, September 7-10, 2003: Proceedings

by Marshall, Alan | Agoulmine, Nazim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 MAR] (1).
218. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
219. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
220. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).

Powered by Koha