221. Online business security systems

by Williams, Godfried B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 WIL] (1).
222. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
223. Privacy-preserving data mining : models and algorithms

by Aggarwal, Charu C | Yu, Philip S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
224. Secure integrated circuits and systems

by Verbauwhede, Ingrid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 621.3815 VER] (1).
225. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
226. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
227. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
228. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
229. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
230. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
231. Open source systems security certification

by Damiani, Ernesto | Ardagna, Claudio Agostino | Ioini, Nabil El.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 DAM] (1).
232. Future of identity in the information society

by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
233. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
234. Cryptographic security architecture : design and verification

by Gutmann, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
235. Multimedia data hiding

by Wu, Min | Liu, Bede.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
236. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
237. Elsevier's dictionary of information security in English, German, French and Russian

by Radichkova, B | Manoilov, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
238. Trust, complexity and control confidence in a convergent world

by Cofta, Piotr.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 COF] (1).
239. Windows vista security : securing vista against malicious attacks

by Grimes, Roger A | Johansson, Jesper M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
240. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).

Powered by Koha