721. Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamanig, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
722. Steganography and watermarking

by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
723. Future of the Internet and How to Stop it

by Zittrain, Jonathan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Penguin Books, 2008Availability: Items available for loan: [Call number: 004.6780112 ZIT] (1).
724. Information Assurance

by Blyth, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
725. Peer-to-Peer Computing : building supercomputers with Web technologies

by Loo, Alfred Wai-Sing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 004.65 LOO] (1).
726. Embedded Java security : security for mobile devices

by Debbabi, Mourad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
727. Guide to computer network security

by Kizza, Joseph Migga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
728. Intrusion detection : a machine learning approach

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
729. Information warfare

by Ventre, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
730. Cloud computing : assessing the risks

by Carstensen, Jared | Golden, Bernard | Morgenthal, J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Emeryville: IT Governance Publishing, 2012Availability: Items available for loan: [Call number: 004.6782 CAR] (1).
731. Professional ASP. NET security

by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
732. Visual Basic .Net code security handbook

by Lippert, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.2768 LIP] (1).
733. Electronic projects for home security

by Bishop, Owen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: BPB Publications, 1992Availability: Items available for loan: [Call number: 621.38928 BIS] (1).
734. Fundamentals of secure computer systems

by Tjaden, Brett C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Wilsonville: Franklin Beedle & Associates, 2004Availability: Items available for loan: [Call number: 005.8 TJA] (1).
735. Gandhi and Bengal : a descriptive chronology

by Gandhi, Gopalkrishna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Seagull Books, 2007Availability: Items available for loan: [Call number: 954.9202092 GAN] (1).
736. Wireless hacking : projects for wi-fi enthusiasts

by Barken, Lee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
737. Trusted computing for embedded systems

by Candaele, Bernard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8 CAN] (1).
738. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
739. Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003 Belfast, Northern Ireland, UK, September 7-10, 2003: Proceedings

by Marshall, Alan | Agoulmine, Nazim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 MAR] (1).
740. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).

Powered by Koha