221. Internet security : hacking, counterhacking, and society

by Himma, Kenneth Einar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
222. Information security : contemporary cases

by Wright, Marie A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
223. Computer security : protecting digital resources

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
224. Wireless security : end to end

by Carter, Brian | Shumway, Russell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CAR] (1).
225. Secure broadcast communication in wired and wireless networks

by Perrig, Adrian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.382 PER] (1).
226. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
227. Introduction to security and network forensics

by Buchanan, William J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: [Call number: 005.8 BUC] (1).
228. Security in sensor networks

by Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 681.2 XIA] (1).
229. Security of mobile communications

by Boudriga, Noureddine.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: [Call number: 621.384 BOU] (1).
230. Resource, mobility, and security management in wireless networks and mobile communications

by Zhang, Yan | Fujise, Masayuki | Hu, Honglin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 621.384 ZHA] (1).
231. Security in wireless mesh networks

by Zhang, Yan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
232. Wireless security and cryptography : specifications and implementations

by Zhang, Xinmiao | Sklavos, Nicolas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).
233. Trusted computing

by Mitchell, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
234. Web application security : a beginner's guide

by Sullivan, Bryan | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2012Availability: Items available for loan: [Call number: 006.78 SUL] (1).
235. Cyberspace security and defence : research issues

by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
236. Ethical hacking guide to corporate security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
237. 802.1X port-based authentification

by Brown, Edwin Lyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
238. Mechanics of user identification and authentication : fundamentals of identity management

by Todorov, Dobromir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
239. Handbook of financial cryptography and security

by Rosenberg, Burton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
240. Multimedia content encryption : techniques and applications

by Lian, Shiguo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).

Powered by Koha