621. Computer architecture and security fundamentals of designing secure computer systems

by Wang, Shuangbao Paul | Ledley, Robert S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: John Wiley & Sons, 2013Availability: Items available for loan: [Call number: 005.8 WAN] (1).
622. Web application security : a beginner's guide

by Sullivan, Bryan | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2012Availability: Items available for loan: [Call number: 006.78 SUL] (1).
623. Data Communications and Networking

by Forouzan, Behrouz A.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill Education India, 2013Availability: Items available for loan: [Call number: 004.6 FOR] (2).
624. Cyberspace security and defence : research issues

by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
625. Physics for medical imaging applications

by Lemoigne, Yves | Caner, Alessandra | Rahal, Ghita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2007Availability: Items available for loan: [Call number: 616.0754 LEM] (1).
626. Informed watermarking

by Eggers, Joachim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2002Availability: Items available for loan: [Call number: 005.8 EGG] (1).
627. Sensors for environment, health and security : advanced materials and technologies

by Baraton, Marie-Isabelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
628. Sensors for environment, health and security : advanced materials and technologies

by Baraton, Marie-Isabelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 681.2 BAR] (1).
629. Ethical hacking guide to corporate security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
630. Social policy in the modern world : a comparative text

by Hill, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Malden: Blackwell, 2006Availability: Items available for loan: [Call number: 320.6 HIL] (1).
631. 802.1X port-based authentification

by Brown, Edwin Lyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
632. Computer system security : basic concepts and solved exercises

by Avoine, Gildas | Junod, Pascal | Oechslin, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 AVO] (1).
633. Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks

by Brancik, Kenneth C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 BRA] (1).
634. Mechanics of user identification and authentication : fundamentals of identity management

by Todorov, Dobromir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
635. Data-driven block ciphers for fast telecommunication systems

by Moldovyan, Nikolay A | Moldovyan, Alexander A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 MOL] (1).
636. Handbook of financial cryptography and security

by Rosenberg, Burton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
637. Understanding and applying cryptography and data security

by Elbirt, Adam J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 ELB] (1).
638. Multimedia content encryption : techniques and applications

by Lian, Shiguo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.82 LIA] (1).
639. Grid computing : infrastructure, service, and applications

by Wang, Lizhe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 004.36 WAN] (1).
640. Security in RFID and sensor networks

by Zhang, Yan | Kitsos, Paris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 681.2 ZHA] (1).

Powered by Koha