281. Security in distributed, grid, mobile, and pervasive computing

by Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
282. Security for mobility

by Mitchell, Chris J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2004Availability: Items available for loan: [Call number: 005.8 MIT] (1).
283. Trusted computing

by Mitchell, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
284. Computer architecture and security fundamentals of designing secure computer systems

by Wang, Shuangbao Paul | Ledley, Robert S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
285. Cyberspace security and defence : research issues

by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
286. Informed watermarking

by Eggers, Joachim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
287. Ethical hacking guide to corporate security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
288. Computer system security : basic concepts and solved exercises

by Avoine, Gildas | Junod, Pascal | Oechslin, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 AVO] (1).
289. Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks

by Brancik, Kenneth C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 BRA] (1).
290. Mechanics of user identification and authentication : fundamentals of identity management

by Todorov, Dobromir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
291. Data-driven block ciphers for fast telecommunication systems

by Moldovyan, Nikolay A | Moldovyan, Alexander A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
292. Understanding and applying cryptography and data security

by Elbirt, Adam J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
293. Applied algebra : codes, ciphers and discrete algorithms

by Hardy, Darel W | Richman, Fred | Walker, Carol L.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
294. Cryptanalysis of RSA and its variants

by Hinek, M. Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
295. Multidiciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
296. Architecting secure software systems

by Talukder, Asoke K | Chaitanya, Manish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
297. Software security technologies : a programmatic approach

by Sinn, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (3).
298. Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS

by Macaulay, Tyson | Singer, Bryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.478 MAC] (1).
299. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
300. Unauthorized access : the crisis in online privacy and security

by Sloan, Robert H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).

Powered by Koha