661. Handbook of finite fields

by Mullen, Gary L | Panario, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.3 MUL] (1).
662. Anonymous communication networks : protecting privacy on the web

by Peng, Kun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 PEN] (1).
663. Hardware security : design, threats, and safeguards

by Mukhopadhyay, Debdeep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 MUK] (1).
664. Encryption for digital content

by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
665. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
666. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
667. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
668. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
669. Hackers

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
670. Computer science illuminated

by Dale, Nell | Lewis, John.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Jones & Bartlett, 2013Availability: Items available for loan: [Call number: 004 DAL] (1).
671. Economics of information security and privacy III

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
672. Security and privacy in social networks

by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
673. Physical unclonable functions in theory and practice

by Hofer, Maximilian | Bohm, Christoph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.3815 BOH] (1).
674. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
675. Security for cloud storage systems

by Yang, Kan | Jia, Xiaohua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
676. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
677. Essential cybersecurity science : build, test, and evaluate secure systems

by Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
678. Secure messaging with PGP and S/MIME

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
679. Security technologies for the world wide web

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
680. Computer and intrusion forensics

by Mohay, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 MOH] (1).

Powered by Koha