|
61.
|
What every librarian should know about electronic privacy
by Woodward, Jeannette. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
|
|
62.
|
Information Assurance
by Blyth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
|
|
63.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
64.
|
World beyond digital rights management
by Umeh, Jude C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Swindon: British Computer Society, 2007Availability: Items available for loan: [Call number: 346.0482 UME] (1).
|
|
65.
|
Attribute-based credentials for trust : identity in the information society
by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
|
|
66.
|
Security, privacy and trust in modern data management
by Petkovic, Milan | Jonker, Willem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
|
|
67.
|
Information hiding and applications
by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
|
|
68.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
69.
|
Collaborative financial infrastructure protection : tools, abstractions, and middleware
by Baldoni, Roberto | Chockler, Gregory. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
70.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
71.
|
Data protection for virtual data centers
by Buffington, Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2010Availability: Items available for loan: [Call number: 005.8 BUF] (1).
|
|
72.
|
Advances in artificial intelligence for privacy protection and security
by Solanas, Agusti | Mart�nez-Balleste, Antoni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
73.
|
Writing information security policies
by Barman, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
74.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
75.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
76.
|
Detecting peripheral-based attacks on the host memory
by Stewin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2015Availability: Items available for loan: [Call number: 005.84 STE] (1).
|
|
77.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
78.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
79.
|
Understanding high-dimensional spaces
by Skillicorn, David B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.312 SKI] (1).
|
|
80.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|