|
541.
|
Best of 2600 : a hacker odyssey
by Goldstein, Emmanuel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 005.8 GOL] (1).
|
|
542.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
543.
|
Schneier on security
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
|
|
544.
|
Cracking drupal : a drop in the bucket
by Knaddison, Greg James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 006.76 KNA] (1).
|
|
545.
|
Cryptography engineering : design principles and practical applications
by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
546.
|
Distributed systems security : issues, processes and solutions
by Belapurkar, Abhijit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.8 BEL] (1).
|
|
547.
|
Cellular authentication for mobile and internet services
by Holtmanns, Silke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 HOL] (1).
|
|
548.
|
Security in a Web 2.0+ world : a standards based approach
by Solari, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
549.
|
Information technology security and risk management
by Slay, Jill | Koronios, Andy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Milton: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
550.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
551.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
552.
|
Innocent code : a security wake up call for Web programmers.
by Huseby, Sverre H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
|
|
553.
|
Host Identity Protocol (HIP) : towards the secure mobile Internet
by Gurtov, Andrei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 GUR] (1).
|
|
554.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|
|
555.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
556.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
557.
|
Enterprise Security With EJB and CORBA
by Hartman, Bret. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
558.
|
Designing Security Architecture Solutions
by Ramachandran, Jay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
|
|
559.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
560.
|
Computer Networking : Internet protocols in action
by Matthews, Jeanna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 004.62 MAT] (2).
|