261. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
262. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
263. Hacker's handbook : the strategy behind breaking into and defending networks

by Susan Young | Aitel, Dav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
264. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
265. Policy-based network configuration management for MANETs

by Chadha, Ritu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
266. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
267. Web security

by Chen, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
268. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
269. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
270. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
271. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
272. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
273. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
274. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
275. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
276. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
277. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
278. Implementing SSL/​TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
279. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
280. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).

Powered by Koha