361. Visual cryptography and secret image sharing

by Climato, Stelvio | Yang, Ching-Nung.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Crc Press, 2011Availability: Items available for loan: [Call number: 005.82 CIM] (1).
362. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
363. Cyber-physical security

by Clark, Robert M | Hakim, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 CLA] (1).
364. Detecting peripheral-based attacks on the host memory

by Stewin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2015Availability: Items available for loan: [Call number: 005.84 STE] (1).
365. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
366. SCION : a secure internet architecture

by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
367. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
368. Inside radio : an attack and defense guide

by Yang, Qing | Huang, Lin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2018Availability: Items available for loan: [Call number: 621.382 YAN] (1).
369. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
370. Android security internals : an in-depth guide to Android's security architecture

by Elenkov, Nikolay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2015Availability: Items available for loan: [Call number: 004.1675 ELE] (1).
371. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
372. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
373. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
374. Bitcoin and blockchain security

by Karame, Ghassan | Androulaki, Elli.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Artech House, 2016Availability: Items available for loan: [Call number: 332.178 KAR] (1).
375. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
376. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
377. Implementing SSL/​TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
378. On privacy-preserving protocols for smart metering systems : security and privacy in smart grids

by Borges de Oliveira, Fábio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 621.3191 BOR] (1).
379. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
380. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).

Powered by Koha