381. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
382. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
383. Information security illuminated

by Chapple, Mike | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
384. Complete Guide to Internet Security

by Merkow, Mark S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
385. Security and privacy in user modeling

by Schreck, Jorg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
386. Writing information security policies

by Barman, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
387. Digital watermarking for digital media

by Seitz, Juergen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
388. Machine learning and data mining for computer security : methods and applications

by Maloof, Marcus A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
389. Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers

by Dingledine, Roger | Syverson, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
390. Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers

by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
391. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
392. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
393. Microsoft Windows security for Windows XP and Windows 2000: inside out

by Siechert, Carl | Bott, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BOT] (2).
394. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
395. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
396. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
397. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
398. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
399. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
400. Bug hunter's diary : a guided tour through the wilds of software security.

by Klein, Tobias.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco No Starch Press 2011Availability: Items available for loan: [Call number: 005.8 KLE] (1).

Powered by Koha