|
821.
|
Web security sourcebook : a complete guide to web security threats and solutions
by Geer, Daniel | Ranum, Marcus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
|
|
822.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|
|
823.
|
Essential PHP security
by Shiflett, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Beijing: O'Reilly, 2006Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
824.
|
Connecting with computer science
by Anderson, Greg | Ferro, David | Hilton, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2005Availability: Items available for loan: [Call number: 004 AND] (2).
|
|
825.
|
Individualized Society
by Bauman, Zygmunt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Polity Press, 2001Availability: Items available for loan: [Call number: 302.54 BAU] (1).
|
|
826.
|
Information security illuminated
by Chapple, Mike | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
827.
|
Complete Guide to Internet Security
by Merkow, Mark S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
|
|
828.
|
Security and privacy in user modeling
by Schreck, Jorg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
829.
|
Writing information security policies
by Barman, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
830.
|
Digital watermarking for digital media
by Seitz, Juergen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
|
|
831.
|
Machine learning and data mining for computer security : methods and applications
by Maloof, Marcus A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
832.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
833.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
834.
|
Intelligence and Security Informatics : First NSF/NIJ Symposium, ISI 2003 Tucson, AZ, USA, June 2-3, 2003 proceedings
by Chen, Hsinchun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 CHE] (1).
|
|
835.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
836.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|
|
837.
|
Microsoft building enterprise active directory services
by Microsoft Corporation. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.754 MIC] (2).
|
|
838.
|
Microsoft Windows 2000 Security
by Internet Security System Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
|
|
839.
|
Microsoft Windows security for Windows XP and Windows 2000: inside out
by Siechert, Carl | Bott, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BOT] (2).
|
|
840.
|
Network security and management
by Singh, Brijendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|