621. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
622. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
623. Terrestrial-satellite communication networks : transceivers design and resource allocation

by Kuang, Linling | Jiang, Chunxiao | Qian, Yi | Lu, Jianhua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.3825 KUA] (1).
624. Cloud enterprise architecture

by Raj, Pethuru.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 004.6782 RAJ] (1).
625. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
626. Complex networks : a networking and signal processing perspective

by Manoj, B. S | Chakraborty, Abhishek | Singh, Rahul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Prentice Hall 2018Availability: Items available for loan: [Call number: 621.3822 MAN] (1).
627. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
628. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
629. Computer systems : digital design, fundamentals of computer architecture and assembly language

by Elahi, Ata.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 621.382 ELA] (1).
630. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
631. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
632. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
633. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
634. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
635. Implementing SSL/​TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Wiley, 2011Availability: Items available for loan: [Call number: 005.8 DAV] (1).
636. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
637. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
638. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
639. Mathematical theories of distributed sensor networks

by Iyengar, Sitharama S | Boroojeni, Kianoosh G [aut] | Balakrishnan, N [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2014Availability: Items available for loan: [Call number: 621.382 IYE] (1).
640. Learning-based VANET Communication and Security Techniques

by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).

Powered by Koha