401. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
402. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
403. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
404. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
405. Phishing dark waters : the offensive and defensive sides of malicious emails

by Hadnagy, Christopher | Fincher, Michele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2015Availability: Items available for loan: [Call number: 364.1632 HAD] (1).
406. Practical malware analysis : the hands-on guide to dissecting malicious software

by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.84 SIK] (1).
407. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
408. Listening in : cybersecurity in an insecure age

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Yale University Press, 2017Availability: Items available for loan: [Call number: 364.16​8 LAN] (1).
409. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
410. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
411. Digital fortress

by Brown, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Transworld publishers, 1998Availability: Items available for loan: [Call number: 813.54 BRO] (1).
412. Principles of secure processor architecture design

by Szefer, Jakub.

Material type: book Book Publisher: S.l. Morgan & Claypool 2019Availability: Items available for loan: [Call number: 004.22 SZE] (1).
413. Malware data science : attack detection and attribution

by Saxe, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).
414. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
415. Circuits and systems for security and privacy

by Sheikh, Farhana | Sousa, Leonel A | Iniewski, Krzysztof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Availability: Items available for loan: [Call number: 005.8 SHE] (1).
416. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
417. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
418. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
419. Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications

by Möller, Dietmar P. F | Haas, Roland E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
420. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).

Powered by Koha