|
61.
|
Developing secure distributed systems with CORBA
by Lang, Ulrich | Schreiner, Rudolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 LAN] (1).
|
|
62.
|
Role-based access control
by Ferraiolo, David F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
63.
|
User's guide to cryptography and standards
by Mitchell, Chris J | Dent, Alexander W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
64.
|
Computer forensics : computer crime scene investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
65.
|
Software vulnerability guide
by Thompson, Herbert H | Chase, Scott G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
|
|
66.
|
Cryptanalysis of Number Theoretic Ciphers
by Wagstaff, Samuel S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
|
|
67.
|
Applied public key infrastructure : 4th International Workshop : IWAP 2005
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
|
|
68.
|
Computer networking first-step
by Odom, Wendell. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 004.6 ODO] (1).
|
|
69.
|
Honeypots for Windows
by Grimes, Roger A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2005Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
70.
|
Multimedia security : stenography and digital watermaking techniques for protection and intellectual property
by Lu, Chun-Shien. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 005.8 LUC] (1).
|
|
71.
|
Web and information security
by Thuraisingham, Bhavani | Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
72.
|
Privacy protection for e-services
by Yee, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
|
|
73.
|
Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.
by Price, Mike | Foster, James C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
|
|
74.
|
IT security project management : handbook
by Snedaker, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
|
|
75.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
76.
|
Cisco security professional's guide to secure intrusion detection systems
by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
|
|
77.
|
Technology and Privacy
by Agre, Philip E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
|
|
78.
|
Cryptographic hardware and embedded systems - CHES 2002: 4th international workshop Redwood shores, CA, USA, August 13-15, 2002 revised papers
by Kaliski, Burton S | Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
79.
|
Information hiding
by Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
|
|
80.
|
Secure Systems Development with UML
by Jurjens, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).
|