341. Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings

by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
342. Security in computing systems : challenges, approaches and solutions

by Biskup, Joachim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 BIS] (1).
343. Security engineering for service-oriented architectures

by Hafner, Michael | Breu, Ruth.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
344. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
345. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
346. Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers

by Palmer, Charles | Shenoi, Sujeet.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
347. Trust Management IV

by Nishigaki, Masakatsu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
348. Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings

by Mathuria, Anish | Jha, Somesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
349. Foundations of security analysis and design VI : FOSAD tutorial lectures

by Aldini, Alessandro | Gorrieri, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
350. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
351. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
352. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
353. Encryption : protecting your data

by Fadia, Ankit | Bhattacharjee, Jaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
354. Software hacking

by Fadia, Ankit | Patnaik, Nishant Das.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 FAD] (1).
355. Security patterns : integrating security and systems engineering

by Schumacher, Markus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SCH] (1).
356. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
357. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
358. Mark Stamp's information security : principles and practice

by Shah, Deven N | Stamp, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 SHA] (5).
359. Botnets : the killer web app

by Schiller, Craig A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
360. Microsoft Vista for IT security professionals

by Piltzecker, Anthony | Chaffin, Larry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CHA] (2).

Powered by Koha