541. Best of 2600 : a hacker odyssey

by Goldstein, Emmanuel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 005.8 GOL] (1).
542. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
543. Schneier on security

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
544. Cracking drupal : a drop in the bucket

by Knaddison, Greg James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 006.76 KNA] (1).
545. Cryptography engineering : design principles and practical applications

by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
546. Distributed systems security : issues, processes and solutions

by Belapurkar, Abhijit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.8 BEL] (1).
547. Cellular authentication for mobile and internet services

by Holtmanns, Silke.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 HOL] (1).
548. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
549. Information technology security and risk management

by Slay, Jill | Koronios, Andy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Milton: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SLA] (1).
550. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
551. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
552. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
553. Host Identity Protocol (HIP) : towards the secure mobile Internet

by Gurtov, Andrei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 GUR] (1).
554. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
555. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
556. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
557. Enterprise Security With EJB and CORBA

by Hartman, Bret.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
558. Designing Security Architecture Solutions

by Ramachandran, Jay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
559. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
560. Computer Networking : Internet protocols in action

by Matthews, Jeanna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 004.62 MAT] (2).

Powered by Koha