|
1.
|
Quantum cryptography using coherent states : randomized encryption and key generation
by Corndorf, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
2.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
|
|
3.
|
Security in computing
by Pfleeger, Charles P. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
4.
|
Unwanted gaze : a dictionary of privacy in America
by Rosen, Jeffrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
|
|
5.
|
Shellcoder's handbook : discovering and exploiting security holes
by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
|
|
6.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
7.
|
Information hiding : steganography and watermarking, attacks and countermeasures
by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
|
|
8.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
9.
|
Digital watermarking
by Miller, Matthew L | Bloom, Jeffrey A | Cox, Ingemar J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 005.8 COX] (2).
|
|
10.
|
Information hiding techniques for steganography and digital watermarking
by Katzenbeisser, Stefan | Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|
|
11.
|
Techniques and applications of digital watermarking and content protection
by Arnold, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 ARN] (1).
|
|
12.
|
Computer forensics and privacy
by Caloyannides, Michael A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 CAL] (1).
|
|
13.
|
Privacy protection for e-services
by Yee, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
|
|
14.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
15.
|
Technology and Privacy
by Agre, Philip E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
|
|
16.
|
Information hiding
by Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
|
|
17.
|
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers
by Chae, Kijoon | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
|
|
18.
|
Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers
by Lim, Chae Hoon | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
|
|
19.
|
Digital Rights Management : Technological, Economic, Legal and Political Aspects
by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
|
|
20.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|