241. Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise

by Hoffman, Daniel V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
242. Web application hacker?s handbook : discovering and exploiting security flaws

by Stuttard, Dafydd.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
243. Best of 2600 : a hacker odyssey

by Goldstein, Emmanuel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 005.8 GOL] (1).
244. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
245. Schneier on security

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
246. Cracking drupal : a drop in the bucket

by Knaddison, Greg James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 006.76 KNA] (1).
247. Cryptography engineering : design principles and practical applications

by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
248. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
249. Information technology security and risk management

by Slay, Jill | Koronios, Andy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Milton: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SLA] (1).
250. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
251. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
252. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
253. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
254. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
255. Designing Security Architecture Solutions

by Ramachandran, Jay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
256. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
257. Information security : a strategic approach

by LeVeque, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
258. Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers

by Mitnick, Kevin D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
259. Computer security and cryptography

by Konheim, Alan G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
260. Protecting information : from classical error correction to quantum cryptography

by Loepp, Susan | Wootters, William Kent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 004.1 LOE] (1).

Powered by Koha