|
41.
|
PC pest control : protect your computers from malicious internet invaders.
by Gralla, Preston. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
|
|
42.
|
Peter Norton's network security fundamentals
by Norton, Peter | Stockman, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
|
|
43.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
44.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
45.
|
Unwanted gaze : a dictionary of privacy in America
by Rosen, Jeffrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
|
|
46.
|
Introduction to cryptography with Java applets
by Bishop, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
47.
|
Shellcoder's handbook : discovering and exploiting security holes
by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
|
|
48.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
49.
|
Contemporary cryptology : the science of information integrity
by Simmons, Gustavus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
|
|
50.
|
Information hiding : steganography and watermarking, attacks and countermeasures
by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
|
|
51.
|
Statistical methods in computer security
by Chen, William W. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
52.
|
Public key infrastructure : building trusted applications and web services
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
53.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
54.
|
Enhanced methods in computer security, biometric and artificial intelligence systems
by Piegat, Andrzej | Pejas, Jerzy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Kluwer Academic Publishers, 2005Availability: Items available for loan: [Call number: 005.8 PEJ] (1).
|
|
55.
|
Digital privacy : theory, technologies, and practices
by Acquisti, Alessandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
|
|
56.
|
IM, instant messaging security
by Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
|
|
57.
|
Digital watermarking
by Miller, Matthew L | Bloom, Jeffrey A | Cox, Ingemar J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 005.8 COX] (2).
|
|
58.
|
Information hiding techniques for steganography and digital watermarking
by Katzenbeisser, Stefan | Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|
|
59.
|
Techniques and applications of digital watermarking and content protection
by Arnold, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 ARN] (1).
|
|
60.
|
Computer forensics and privacy
by Caloyannides, Michael A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 CAL] (1).
|