81. Quantum cryptography : from key distribution to conference key agreement

by Grasselli, Federico.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
82. Privacy is hard and seven other myths : achieving privacy through careful design

by Hoepman, Jaap-Henk.

Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
83. Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us

by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
84. Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10

by Nita, Stefania Loredana | Mihailescu, Marius Iulian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
85. Trusted cellular IoT devices : design ingredients and concepts

by Heins, Kersten.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
86. Introduction to cybersecurity : a multidisciplinary challenge

by Sharp, Robin.

Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 SHA] (1).

Powered by Koha