|
41.
|
Analyzing computer security : a threat/vulnerability/countermeasure approach
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
42.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
43.
|
Trust Management II : proceedings of IFIPTM 2008 : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
by Karabulut, Yucel | Herrmann, Peter | Jensen, Christian Damsgaard | Mitchell, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005 KAR] (1).
|
|
44.
|
Encyclopedia of cryptography and security
by Tilborg, Henk C. A. van. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
|
|
45.
|
Privacy-preserving data mining : models and algorithms
by Aggarwal, Charu C | Yu, Philip S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
|
|
46.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
47.
|
Fifth world conference on information security education: proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States military academy, west point, New York, USA
by Dodge, Ronald | Futcher, Lynn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8073 FUT] (1).
|
|
48.
|
Smart card applications : design models for using and programming smart cards
by Rankl, Wolfgang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.56 RAN] (1).
|
|
49.
|
Cryptology unlocked
by Wobst, Reinhard | Shafir, Angelika. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
|
|
50.
|
Steganography in digital media : principles, algorithms, and applications
by Fridrich, Jessica. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2010Availability: Items available for loan: [Call number: 005.82 FRI] (1).
|
|
51.
|
Silicon jungle : a novel of deception, power, and internet intrigue
by Baluja, Shumeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2011Availability: Items available for loan: [Call number: 813.6 BAL] (1).
|
|
52.
|
Privacy, information and technology
by Solove, Daniel J | Schwartz, Paul M. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Aspen Publishers, 2008Availability: Items available for loan: [Call number: 342.730858 SOL] (1).
|
|
53.
|
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
|
|
54.
|
Informed watermarking
by Eggers, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
|
|
55.
|
Multimedia content encryption : techniques and applications
by Lian, Shiguo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
|
|
56.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|
|
57.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
58.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
59.
|
Software similarity and classification
by Cesare, Silvio | Xiang, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2012Availability: Items available for loan: [Call number: 005.8 CES] (1).
|
|
60.
|
Computer and intrusion forensics
by Mohay, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).
|