|
41.
|
Public key infrastructure : building trusted applications and web services
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
42.
|
Technical guide to IPSec virtual private networks
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
|
|
43.
|
Disruptive security technologies with mobile code and peer to peer networks
by Brooks, Richard R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
44.
|
Multimedia security handbook
by Kirovski, Darko | Furht, Borko. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
|
|
45.
|
Network security technologies
by Fung, Kwok T. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
46.
|
Quantum communications and cryptography
by Sergienko, Alexander V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
|
|
47.
|
Multimedia watermarking techniques and applications
by Furht, Borko | Kirovski, Darko. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 005.82 FUR] (1).
|
|
48.
|
Cyber security : turning national solutions into international cooperation
by Lewis, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
|
|
49.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
50.
|
IM, instant messaging security
by Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
|
|
51.
|
Policy-Based Network Management : solutions for the next generation
by Strassner, John C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2003Availability: Items available for loan: [Call number: 004.6 STR] (1).
|
|
52.
|
Security fundamentals for e-commerce
by Hassler, Vesna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 HAS] (1).
|
|
53.
|
Smart card security and applications
by Hendry, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 621.38928 HEN] (1).
|
|
54.
|
Internet and intranet security
by Oppliger, Rolf. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
55.
|
Non-Repudiation in electronic commerce
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
|
|
56.
|
Multicast and group security
by Hardjono, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
57.
|
Bluetooth security
by Persson, Joakim | Smeets, Ben. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2004Availability: Items available for loan: [Call number: 005.8 GEH] (1).
|
|
58.
|
Wireless communications security
by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
|
|
59.
|
Security in wireless LANs and MANs
by Hardjono, Thomas | Dondeti, Lakshminath R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
60.
|
IT and security comparison decision support system for wireless LANs
by Reynolds, Kevin T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Universal Publishers, 2004Availability: Items available for loan: [Call number: 004.68 REY] (1).
|