|
201.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
202.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
203.
|
Enterprise Security With EJB and CORBA
by Hartman, Bret. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
204.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
205.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
206.
|
Information security : a strategic approach
by LeVeque, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
|
|
207.
|
Security for wireless ad-hoc networks
by Anjum, Farooq | Mouchtaris, Petros. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 ANJ] (1).
|
|
208.
|
Physical-layer security : from information theory to security engineering
by Bloch, Matthieu | Barros, Joao. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2011Availability: Items available for loan: [Call number: 621.382 BLO] (1).
|
|
209.
|
Security of e-systems and computer networks
by Obaidat, Mohammad S | Boudriga, Noureddine A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2007Availability: Items available for loan: [Call number: 005.8 OBA] (1).
|
|
210.
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
by Buttyan, Levente | Hubaux, Jean-Pierre. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
|
|
211.
|
Security and quality of service in ad hoc wireless networks
by Mishra, Amitabh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
|
|
212.
|
Wireless Internet security : architecture and protocols
by Kempf, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
|
|
213.
|
Digital identity management : technological, business, and social implications
by Birch, David G. W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
|
|
214.
|
Security monitoring
by Fry, Chris | Nystrom, Martin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
|
|
215.
|
Web security for network and system administrators
by Mackey, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
|
|
216.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
217.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
218.
|
Electronic elections : the perils and promises of digital democracy
by Alvarez, Michael R | Hall, Thad E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2010Availability: Items available for loan: [Call number: 324.65 ALV] (1).
|
|
219.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
220.
|
Optimizing and Testing WLANs : proven techniques for maximum performance
by Alexander, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 004.68 ALE] (1).
|