381. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
382. Cryptography and secure communication

by Blahut, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
383. Data science for cyber-security

by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
384. Wireless powered communication networks : from security challenges to IoT applications

by Jamalipour, Abbas | Bi, Ying [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 621.382 JAM] (1).
385. Information theoretic security and privacy of information systems

by Schaefer, Rafael F | Boche, Holger.

Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
386. Blockchain for distributed systems security

by Shetty, Sachin S.

Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
387. Intelligent copyright protection for images

by Roy, Subhrajit Sinha | Basu, Abhishek | Chattopadhyay, Avik.

Publisher: Boca Raton Chapman and Hall/CRC 2019Availability: Items available for loan: [Call number: 346.0482 ROY] (1).
388. Machine learning for computer and cyber security : principle algorithms and practices

by Gupta, Brij B | Sheng, Michael.

Publisher: United States CRC Press 2019Availability: Items available for loan: [Call number: 006.31 GUP] (1).
389. Security and auditing of smart devices : managing proliferation of confidential data on corporate and BYOD devices

by Rai, Sajay | Chukwuma, Philip | Cozart, Richard.

Publisher: New York CRC Press 2017Availability: Items available for loan: [Call number: 621.38456028558 RAI] (1).
390. Blockchain for cyberphysical systems

by Dorri, Ali | Kanhere, Salil | Jurdak, Raja.

Publisher: Boston : Artech House, 2020Availability: Items available for loan: [Call number: 005.824 DOR] (1).
391. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
392. Practical IoT hacking : the definitive guide to attacking the internet of things

by Chantzis, Fotios | Stais, Ioannis | Calderon, Paulino | Deirmentzoglou, Evangelos | Woods, Beau.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.87 CHA] (1).
393. Cybersecurity : the insights you need from Harvard Business Review

by Harvard Business Review.

Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
394. If it's smart, it's vulnerable

by Hypponen, Mikko.

Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
395. NTP security : a quick-start guide

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).
396. Quantum key distribution : an introduction with exercises

by Wolf, Ramona.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
397. Secure web application development : a hands-on guide with Python and Django

by Baker, Matthew.

Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.8 BAK] (1).
398. Enterprise level security 1 - 2 : advanced topics in an uncertain world

by Foltz, Kevin E | Simpson, William Randolph.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.8 FOL] (2).
399. Privacy-preserving computing for big data analytics and AI

by Chen, Kai | Yang, Qiang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).

Powered by Koha