601. IEEE International Conference on Multimedia Computing and System, June 7-11, 1999

by IEEE Computer Society.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Computer Society, 1999Availability: Items available for loan: [Call number: 006.7 IEE] (2).
602. 13th IEEE Computer Security Foundations Workshop

by Titsworth, Frances M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
603. Secure broadcast communication in wired and wireless networks

by Perrig, Adrian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.382 PER] (1).
604. Towards a quarter-century of public key cryptography

by Koblitz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
605. Failed states : the abuse of power and the assault on democracy

by Chomsky, Noam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Metropolitan Books, 2006Availability: Items available for loan: [Call number: 327.730090511 CHO] (1).
606. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
607. Cryptography : an introduction

by Yashchenko, V. V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2002Availability: Items available for loan: [Call number: 005.82 YAS] (1).
608. Wireless Internet Handbook : technologies, standards, and applications

by Furht, Borko | Ilyas, Mohammad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 004.678 FUR] (1).
609. Database and applications security : integrating information security and data management

by Thuraisingham, Bhavani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 THU] (1).
610. Grid database design

by Wells, April J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 004.36 WEL] (1).
611. Introduction to security and network forensics

by Buchanan, William J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: [Call number: 005.8 BUC] (1).
612. Security in sensor networks

by Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 681.2 XIA] (1).
613. Security in distributed, grid, mobile, and pervasive computing

by Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
614. Security of mobile communications

by Boudriga, Noureddine.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: [Call number: 621.384 BOU] (1).
615. Resource, mobility, and security management in wireless networks and mobile communications

by Zhang, Yan | Fujise, Masayuki | Hu, Honglin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 621.384 ZHA] (1).
616. Security in wireless mesh networks

by Zhang, Yan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
617. Wireless security and cryptography : specifications and implementations

by Zhang, Xinmiao | Sklavos, Nicolas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).
618. Security for mobility

by Mitchell, Chris J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2004Availability: Items available for loan: [Call number: 005.8 MIT] (1).
619. Trusted computing

by Mitchell, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
620. Identity and security : a common architecture & framework for SOA and network convergence

by Radhakrishnan, Rakesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Futuretext, 2007Availability: Items available for loan: [Call number: 621.382 RAD] (1).

Powered by Koha