61. Encyclopedia of cryptography and security

by Tilborg, Henk C. A. van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
62. Privacy-preserving data mining : models and algorithms

by Aggarwal, Charu C | Yu, Philip S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
63. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
64. Fifth world conference on information security education: proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States military academy, west point, New York, USA

by Dodge, Ronald | Futcher, Lynn.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8073 FUT] (1).
65. Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence

by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
66. Smart card applications : design models for using and programming smart cards

by Rankl, Wolfgang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.56 RAN] (1).
67. Cryptology unlocked

by Wobst, Reinhard | Shafir, Angelika.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
68. Essential maths for geoscientists : an introduction

by Palmer, Paul I.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley-Blackwell, 2014Availability: Items available for loan: [Call number: 510.2455 PAL] (1).
69. Cryptography and E-Commerce

by Graff, Jon C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 GRA] (1).
70. Steganography in digital media : principles, algorithms, and applications

by Fridrich, Jessica.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2010Availability: Items available for loan: [Call number: 005.82 FRI] (1).
71. Silicon jungle : a novel of deception, power, and internet intrigue

by Baluja, Shumeet.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2011Availability: Items available for loan: [Call number: 813.6 BAL] (1).
72. Privacy, information and technology

by Solove, Daniel J | Schwartz, Paul M.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Aspen Publishers, 2008Availability: Items available for loan: [Call number: 342.730858 SOL] (1).
73. Thinking about cultural resource management : essays from the edge

by King, Thomas F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lanham: Rowman & Littlefield Publishers, 2002Availability: Items available for loan: [Call number: 363.690973 KIN] (1).
74. Global Software Development

by Karolak, Dale Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: IEEE Computer Society, 1998Availability: Items available for loan: [Call number: 005.1 KAR] (1).
75. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
76. Informed watermarking

by Eggers, Joachim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
77. Multimedia content encryption : techniques and applications

by Lian, Shiguo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
78. Digital imaging for cultural heritage preservation : analysis, restoration, and reconstruction of ancient artworks

by Stanco, Filippo | Battiato, Sebastiano | Gallo, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 006.6 STA] (1).
79. Unauthorized access : the crisis in online privacy and security

by Sloan, Robert H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
80. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).

Powered by Koha