|
381.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|
|
382.
|
Information security illuminated
by Chapple, Mike | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
383.
|
Complete Guide to Internet Security
by Merkow, Mark S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
|
|
384.
|
Security and privacy in user modeling
by Schreck, Jorg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
385.
|
Writing information security policies
by Barman, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
386.
|
Digital watermarking for digital media
by Seitz, Juergen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
|
|
387.
|
Machine learning and data mining for computer security : methods and applications
by Maloof, Marcus A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
388.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
389.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
390.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
391.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|
|
392.
|
Microsoft Windows security for Windows XP and Windows 2000: inside out
by Siechert, Carl | Bott, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BOT] (2).
|
|
393.
|
Network security and management
by Singh, Brijendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
394.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
395.
|
Security warrior
by Peikari, Cyrus | Chuvakin, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
|
|
396.
|
Applied cryptography : protocols, algorithms and source code in C
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
|
|
397.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
398.
|
Bug hunter's diary : a guided tour through the wilds of software security.
by Klein, Tobias. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco No Starch Press 2011Availability: Items available for loan: [Call number: 005.8 KLE] (1).
|
|
399.
|
Artificial immune system : applications in computer security
by Tan, Ying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-IEEE Computer Society Press, 2016Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
400.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|