401. Artificial immune system : applications in computer security

by Tan, Ying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Wiley-IEEE Computer Society Press, 2016Availability: Items available for loan: [Call number: 005.8 TAN] (1).
402. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
403. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
404. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
405. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
406. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
407. Phishing dark waters : the offensive and defensive sides of malicious emails

by Hadnagy, Christopher | Fincher, Michele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2015Availability: Items available for loan: [Call number: 364.1632 HAD] (1).
408. Practical malware analysis : the hands-on guide to dissecting malicious software

by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.84 SIK] (1).
409. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
410. Listening in : cybersecurity in an insecure age

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.16​8 LAN] (1).
411. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
412. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
413. Digital fortress

by Brown, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Transworld publishers, 1998Availability: Items available for loan: [Call number: 813.54 BRO] (1).
414. Principles of secure processor architecture design

by Szefer, Jakub.

Material type: book Book Publisher: S.l. Morgan & Claypool 2019Availability: Items available for loan: [Call number: 004.22 SZE] (1).
415. Malware data science : attack detection and attribution

by Saxe, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).
416. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
417. Circuits and systems for security and privacy

by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
418. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
419. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
420. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).

Powered by Koha