|
381.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
382.
|
Cryptography and secure communication
by Blahut, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
383.
|
Data science for cyber-security
by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
|
|
384.
|
Wireless powered communication networks : from security challenges to IoT applications
by Jamalipour, Abbas | Bi, Ying [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 621.382 JAM] (1).
|
|
385.
|
Information theoretic security and privacy of information systems
by Schaefer, Rafael F | Boche, Holger. Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
|
|
386.
|
Blockchain for distributed systems security
by Shetty, Sachin S. Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
|
|
387.
|
Intelligent copyright protection for images
by Roy, Subhrajit Sinha | Basu, Abhishek | Chattopadhyay, Avik. Publisher: Boca Raton Chapman and Hall/CRC 2019Availability: Items available for loan: [Call number: 346.0482 ROY] (1).
|
|
388.
|
Machine learning for computer and cyber security : principle algorithms and practices
by Gupta, Brij B | Sheng, Michael. Publisher: United States CRC Press 2019Availability: Items available for loan: [Call number: 006.31 GUP] (1).
|
|
389.
|
Security and auditing of smart devices : managing proliferation of confidential data on corporate and BYOD devices
by Rai, Sajay | Chukwuma, Philip | Cozart, Richard. Publisher: New York CRC Press 2017Availability: Items available for loan: [Call number: 621.38456028558 RAI] (1).
|
|
390.
|
Blockchain for cyberphysical systems
by Dorri, Ali | Kanhere, Salil | Jurdak, Raja. Publisher: Boston : Artech House, 2020Availability: Items available for loan: [Call number: 005.824 DOR] (1).
|
|
391.
|
How cybersecurity really works : a hands-on guide for total beginners
by Grubb, Sam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
|
|
392.
|
Practical IoT hacking : the definitive guide to attacking the internet of things
by Chantzis, Fotios | Stais, Ioannis | Calderon, Paulino | Deirmentzoglou, Evangelos | Woods, Beau. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.87 CHA] (1).
|
|
393.
|
Cybersecurity : the insights you need from Harvard Business Review
by Harvard Business Review. Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
394.
|
If it's smart, it's vulnerable
by Hypponen, Mikko. Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
|
|
395.
|
NTP security : a quick-start guide
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).
|
|
396.
|
Quantum key distribution : an introduction with exercises
by Wolf, Ramona. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
|
|
397.
|
Secure web application development : a hands-on guide with Python and Django
by Baker, Matthew. Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.8 BAK] (1).
|
|
398.
|
Enterprise level security 1 - 2 : advanced topics in an uncertain world
by Foltz, Kevin E | Simpson, William Randolph. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.8 FOL] (2).
|
|
399.
|
Privacy-preserving computing for big data analytics and AI
by Chen, Kai | Yang, Qiang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|