341. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
342. Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings

by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
343. Security in computing systems : challenges, approaches and solutions

by Biskup, Joachim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 BIS] (1).
344. Security engineering for service-oriented architectures

by Hafner, Michael | Breu, Ruth.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
345. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
346. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
347. Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers

by Palmer, Charles | Shenoi, Sujeet.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
348. Trust Management IV

by Nishigaki, Masakatsu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
349. Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings

by Mathuria, Anish | Jha, Somesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
350. Foundations of security analysis and design VI : FOSAD tutorial lectures

by Aldini, Alessandro | Gorrieri, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
351. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
352. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
353. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
354. Encryption : protecting your data

by Fadia, Ankit | Bhattacharjee, Jaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2007Availability: Items available for loan: [Call number: 005.8 FAD] (1).
355. Software hacking

by Fadia, Ankit | Patnaik, Nishant Das.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 FAD] (1).
356. Security patterns : integrating security and systems engineering

by Schumacher, Markus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SCH] (1).
357. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
358. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
359. Mark Stamp's information security : principles and practice

by Shah, Deven N | Stamp, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 SHA] (5).
360. Botnets : the killer web app

by Schiller, Craig A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).

Powered by Koha