301. Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting.

by Cole, Peter H | Ranasinghe, Damith C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 621.384 COL] (1).
302. Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings

by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
303. Computer network security : theory and practice

by Wang, Jie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 WAN] (1).
304. Security for web services and service-oriented architectures

by Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
305. Security access in wireless local area networks: from architecture and protocols to realization

by Ma, Jianfeng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 MAJ] (1).
306. E-Technologies : innovation in an open world

by Babin, Gilbert | Kropf, Peter | Weiss, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2009Availability: Items available for loan: [Call number: 658.4038 BAB] (1).
307. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
308. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
309. Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers

by Palmer, Charles | Shenoi, Sujeet.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
310. iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.

by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
311. Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings

by Mathuria, Anish | Jha, Somesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
312. Mobile hybrid intrusion detection : the MOVICAB-IDS system

by Herrero, Alvaro | Corchado, Emilio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 HER] (1).
313. Collaborative financial infrastructure protection : tools, abstractions, and middleware

by Baldoni, Roberto | Chockler, Gregory.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
314. Foundations of security analysis and design VI : FOSAD tutorial lectures

by Aldini, Alessandro | Gorrieri, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
315. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
316. E-mail hacking : learn e-mail hacking the easy way

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2006Availability: Items available for loan: [Call number: 005.8 FAD] (1).
317. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
318. Network security : a practical approach

by Harrington, Jan L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
319. VoIP security

by Ransome, James F | Rittinghouse, John W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 005.8 RAN] (1).
320. How to cheat at configuring Open Source security tools

by Alder, Raven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 ALD] (1).

Powered by Koha