301. Hardware security : design, threats, and safeguards

by Mukhopadhyay, Debdeep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
302. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
303. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
304. Hackers

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
305. Computer science illuminated

by Dale, Nell | Lewis, John.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Jones & Bartlett, 2013Availability: Items available for loan: [Call number: 004 DAL] (1).
306. Physical unclonable functions in theory and practice

by Hofer, Maximilian | Bohm, Christoph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.3815 BOH] (1).
307. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
308. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
309. Essential cybersecurity science : build, test, and evaluate secure systems

by Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
310. Security technologies for the world wide web

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
311. Computer and intrusion forensics

by Mohay, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
312. Codes : the guide to secrecy from ancient to modern times

by Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
313. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).
314. Foundations of security : what every programmer needs to know

by Daswani, Neil | Kern, Christoph | Kesavan, Anita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
315. What every librarian should know about electronic privacy

by Woodward, Jeannette.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
316. Linux firewalls : attack detection and response with iptables, psad, and fwsnort

by Rash, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
317. Security data visualization : graphical techniques for network analysis

by Conti, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
318. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
319. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
320. Web application vunerabilities : detect, exploit, prevent

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).

Powered by Koha