681. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
682. Scalable and Secure Internet Services and Architecture

by Xu, Cheng zhong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
683. Codes : the guide to secrecy from ancient to modern times

by Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 005.82 MOL] (1).
684. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.8 KAT] (1).
685. Wireless sensor network security

by Zhou, Jianying | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
686. Aspects of network and information security

by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
687. Network security architectures

by Convery, Sean | Cisco Systems, Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
688. Securing the borderless network : security for the web 2.0 world

by Gillis, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2010Availability: Items available for loan: [Call number: 005.8 GIL] (1).
689. Foundations of security : what every programmer needs to know

by Daswani, Neil | Kern, Christoph | Kesavan, Anita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
690. What every librarian should know about electronic privacy

by Woodward, Jeannette.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
691. Network Security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan, 2003Availability: Items available for loan: [Call number: 005.8 FAD] (1).
692. Linux firewalls : attack detection and response with iptables, psad, and fwsnort

by Rash, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
693. Security data visualization : graphical techniques for network analysis

by Conti, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
694. Tangled Web : a guide to securing modern Web applications

by Zalewski, Michal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.8 ZAL] (1).
695. Security for mobile networks and platforms

by Aissi, Selim | Dabbous, Nora | Prasad, Anand R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
696. Delay-and Disruption-Tolerant Networking

by Farrell, Stephen | Cahill, Vinny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
697. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
698. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
699. SSL and TLS : theory and practice

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
700. How to own a shadow : the chase for Knuth

by Long, Johnny | Mullen, Timothy M | Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).

Powered by Koha