|
281.
|
Security in distributed, grid, mobile, and pervasive computing
by Xiao, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
|
|
282.
|
Security for mobility
by Mitchell, Chris J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2004Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
283.
|
Trusted computing
by Mitchell, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
284.
|
Computer architecture and security fundamentals of designing secure computer systems
by Wang, Shuangbao Paul | Ledley, Robert S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
285.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
286.
|
Informed watermarking
by Eggers, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
|
|
287.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
288.
|
Computer system security : basic concepts and solved exercises
by Avoine, Gildas | Junod, Pascal | Oechslin, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 AVO] (1).
|
|
289.
|
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
by Brancik, Kenneth C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
290.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
291.
|
Data-driven block ciphers for fast telecommunication systems
by Moldovyan, Nikolay A | Moldovyan, Alexander A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
|
|
292.
|
Understanding and applying cryptography and data security
by Elbirt, Adam J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
|
|
293.
|
Applied algebra : codes, ciphers and discrete algorithms
by Hardy, Darel W | Richman, Fred | Walker, Carol L. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
|
|
294.
|
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
|
|
295.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
296.
|
Architecting secure software systems
by Talukder, Asoke K | Chaitanya, Manish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
|
|
297.
|
Software security technologies : a programmatic approach
by Sinn, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (3).
|
|
298.
|
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson | Singer, Bryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.478 MAC] (1).
|
|
299.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
300.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|