561. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
562. Information security : a strategic approach

by LeVeque, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2006Availability: Items available for loan: [Call number: 658.0558 LEV] (1).
563. Security for wireless ad-hoc networks

by Anjum, Farooq | Mouchtaris, Petros.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 ANJ] (1).
564. Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers

by Mitnick, Kevin D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
565. Data Communications and Networks

by Irvine, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.382 IRV] (1).
566. Computer security and cryptography

by Konheim, Alan G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
567. Physical-layer security : from information theory to security engineering

by Bloch, Matthieu | Barros, Joao.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2011Availability: Items available for loan: [Call number: 621.382 BLO] (1).
568. Protecting information : from classical error correction to quantum cryptography

by Loepp, Susan | Wootters, William Kent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 004.1 LOE] (1).
569. Elements of UML 2.0 style

by Ambler, Scott W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2005Availability: Items available for loan: [Call number: 005.1 AMB] (1).
570. Elliptic curves in cryptography

by Blake, I. F | Seroussi, G | Smart, N. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
571. Security of e-systems and computer networks

by Obaidat, Mohammad S | Boudriga, Noureddine A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2007Availability: Items available for loan: [Call number: 005.8 OBA] (1).
572. Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

by Buttyan, Levente | Hubaux, Jean-Pierre.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
573. Security and quality of service in ad hoc wireless networks

by Mishra, Amitabh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
574. Wireless Internet security : architecture and protocols

by Kempf, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
575. Digital identity management : technological, business, and social implications

by Birch, David G. W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
576. Secure programming cookbook for C and C++

by Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD/O'Reilly, 2003Availability: Items available for loan: [Call number: 005.133 VIE] (1).
577. Security monitoring

by Fry, Chris | Nystrom, Martin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
578. Myths of security : what the computer security industry doesn't want you to know

by Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 VIE] (1).
579. Web security for network and system administrators

by Mackey, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
580. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).

Powered by Koha