801. SSL and TLS : theory and practice

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
802. How to own a shadow : the chase for Knuth

by Long, Johnny | Mullen, Timothy M | Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
803. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
804. Network and system security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
805. Securing the cloud : cloud computer security techniques and tactics

by Winkler, Vic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
806. Cyber warfare : techniques, tactics and tools for security practitioners

by Andress, Jason | Winterfeld, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
807. Network Simulation

by Fujimoto, Richard M | Perumalla, Kalyan S | Riley, George F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Rafael: Morgan & Claypool Publishers, 2007Availability: Items available for loan: [Call number: 004.65 FUJ] (1).
808. Network coding applications

by Fragouli, Christina | Soljanin, Emina.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hanover: Now Publishers, 2007Availability: Items available for loan: [Call number: 003.5449 FRA] (1).
809. Semantic knowledge management : an ontology-based framework

by Zilli, Antonio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 658.4038 ZIL] (1).
810. Social networking communities and e-dating services : concepts and implications

by Romm-livermore, Celia | Setzekorn, Kristina.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 306.7302854678 ROM] (1).
811. Intelligent techniques for warehousing and mining sensor network data

by Cuzzocrea, Alfredo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2010Availability: Items available for loan: [Call number: 681.2 CUZ] (1).
812. Localization algorithms and strategies for wireless sensor networks

by Mao, Guoqiang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 621.3821 MAO] (1).
813. Web services security development and architecture : theoretical and practical issues

by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
814. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
815. Server side GPS and assisted-GPS in Java

by Harper, Neil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 910 HAR] (2).
816. Nanoscale communication networks

by Bush, Stephen F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 621.38 BUS] (1).
817. Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamanig, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
818. Emerging technologies for knowledge resource management

by Pandian, M. Paul | Karisiddappa, C. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Chandos, 2007Availability: Items available for loan: [Call number: 020.285 PAN] (1).
819. Forensic computing

by Sammes, A. J | Jenkinson, Brian.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 363.250285416 SAM] (1).
820. Embedded Java security : security for mobile devices

by Debbabi, Mourad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).

Powered by Koha