|
421.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
422.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
423.
|
Security of block ciphers : from algorithm design to hardware implementation
by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
424.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
425.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
|
|
426.
|
Wireless communications under hostile jamming : security and efficiency
by Li, Tongtong | Song, Tianlong [aut] | Liang, Yuan [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 005.8 LIT] (1).
|
|
427.
|
Network intrusion detection using deep learning: a feature learning approach
by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
|
|
428.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
429.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
430.
|
Information theoretic security and privacy of information systems
by Schaefer, Rafael F | Boche, Holger. Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
|
|
431.
|
Blockchain for distributed systems security
by Shetty, Sachin S. Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
|
|
432.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
433.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Publisher: New York Cambridge University Press 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
434.
|
How cybersecurity really works : a hands-on guide for total beginners
by Grubb, Sam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
|
|
435.
|
Practical IoT hacking : the definitive guide to attacking the internet of things
by Chantzis, Fotios | Stais, Ioannis | Calderon, Paulino | Deirmentzoglou, Evangelos | Woods, Beau. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.87 CHA] (1).
|
|
436.
|
Exploring malicious hacker communities : toward proactive cyber defence
by Marin, Ericsson | Almukaynizi, Mohammed | Sarkar, Soumajyoti | Nunes, Eric | Shakarian, Jana | Shakarian, Paulo. Publisher: Cambridge : Cambridge University Press, 2021Availability: Items available for loan: [Call number: 363.325 MAR] (1).
|
|
437.
|
Quantum cryptography : from key distribution to conference key agreement
by Grasselli, Federico. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
|
|
438.
|
Privacy is hard and seven other myths : achieving privacy through careful design
by Hoepman, Jaap-Henk. Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
|
|
439.
|
Cybersecurity : the insights you need from Harvard Business Review
by Harvard Business Review. Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
440.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|