201. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
202. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
203. Enterprise Security With EJB and CORBA

by Hartman, Bret.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
204. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
205. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
206. Information security : a strategic approach

by LeVeque, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
207. Security for wireless ad-hoc networks

by Anjum, Farooq | Mouchtaris, Petros.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 ANJ] (1).
208. Physical-layer security : from information theory to security engineering

by Bloch, Matthieu | Barros, Joao.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2011Availability: Items available for loan: [Call number: 621.382 BLO] (1).
209. Security of e-systems and computer networks

by Obaidat, Mohammad S | Boudriga, Noureddine A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2007Availability: Items available for loan: [Call number: 005.8 OBA] (1).
210. Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

by Buttyan, Levente | Hubaux, Jean-Pierre.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
211. Security and quality of service in ad hoc wireless networks

by Mishra, Amitabh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
212. Wireless Internet security : architecture and protocols

by Kempf, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
213. Digital identity management : technological, business, and social implications

by Birch, David G. W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
214. Security monitoring

by Fry, Chris | Nystrom, Martin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
215. Web security for network and system administrators

by Mackey, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
216. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
217. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
218. Electronic elections : the perils and promises of digital democracy

by Alvarez, Michael R | Hall, Thad E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2010Availability: Items available for loan: [Call number: 324.65 ALV] (1).
219. Microsoft windows security resource kit

by Smith, Ben | Komar, Brian | Smith, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
220. Optimizing and Testing WLANs : proven techniques for maximum performance

by Alexander, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 004.68 ALE] (1).

Powered by Koha