821. Web security sourcebook : a complete guide to web security threats and solutions

by Geer, Daniel | Ranum, Marcus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
822. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
823. Essential PHP security

by Shiflett, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Beijing: O'Reilly, 2006Availability: Items available for loan: [Call number: 005.8 SHI] (1).
824. Connecting with computer science

by Anderson, Greg | Ferro, David | Hilton, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2005Availability: Items available for loan: [Call number: 004 AND] (2).
825. Individualized Society

by Bauman, Zygmunt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Polity Press, 2001Availability: Items available for loan: [Call number: 302.54 BAU] (1).
826. Information security illuminated

by Chapple, Mike | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
827. Complete Guide to Internet Security

by Merkow, Mark S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
828. Security and privacy in user modeling

by Schreck, Jorg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
829. Writing information security policies

by Barman, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
830. Digital watermarking for digital media

by Seitz, Juergen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2005Availability: Items available for loan: [Call number: 005.82 SEI] (1).
831. Machine learning and data mining for computer security : methods and applications

by Maloof, Marcus A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
832. Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers

by Dingledine, Roger | Syverson, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
833. Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers

by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
834. Intelligence and Security Informatics : First NSF/NIJ Symposium, ISI 2003 Tucson, AZ, USA, June 2-3, 2003 proceedings

by Chen, Hsinchun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 CHE] (1).
835. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
836. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
837. Microsoft building enterprise active directory services

by Microsoft Corporation.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.754 MIC] (2).
838. Microsoft Windows 2000 Security

by Internet Security System Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
839. Microsoft Windows security for Windows XP and Windows 2000: inside out

by Siechert, Carl | Bott, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BOT] (2).
840. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).

Powered by Koha