|
1.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
|
|
2.
|
Security in computing
by Pfleeger, Charles P. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
3.
|
Creating Location Services for the Wireless Web
by Hjelm, Johan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.319 HJE] (2).
|
|
4.
|
Unwanted gaze : a dictionary of privacy in America
by Rosen, Jeffrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
|
|
5.
|
2000 IEEE symposium on security and privacy
by Titsworth, Frances M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New york: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
|
|
6.
|
Digital privacy : theory, technologies, and practices
by Acquisti, Alessandro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
|
|
7.
|
End of privacy : how total surveillance is becoming a reality
by Whitaker, Reg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: New Press, 1999Availability: Items available for loan: [Call number: 323.448 WHI] (1).
|
|
8.
|
Practical Web Traffic Analysis : standards, privacy, techniques, results
by Fletcher, Peter | Comber, Peter | Pearce, Ben | Poon, Alex. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.K.: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004.678 FLE] (1).
|
|
9.
|
Privacy protection for e-services
by Yee, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
|
|
10.
|
Developing Trust
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Apress, 2002Availability: Items available for loan: [Call number: 005.8 CUR] (1).
|
|
11.
|
Technology and Privacy
by Agre, Philip E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
|
|
12.
|
Software security-theories and systems
by Okada, Mitsuhiro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
|
|
13.
|
Privacy enhancing technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004; revised selected papers
by Martin, David | Serjantov, Andrei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 MAR] (1).
|
|
14.
|
IT-security and privacy : design and use of privacy-enhancing security mechanisms
by Fischer-Hubner, Simone. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2001Availability: Items available for loan: [Call number: 004 FIS] (1).
|
|
15.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
16.
|
Information Security and Privacy
by Pieprzyk, Josef | Seberry, Jennifer. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
|
|
17.
|
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by Imai, Hideki | Zheng, Yuliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
|
|
18.
|
Spychips : how major corporations and government plan to track your every move with RFID
by Albrecht, katherine | McIntyre, Liz. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education Asia, 2006Availability: Items available for loan: [Call number: 323.4482 ALB] (1).
|
|
19.
|
Whole Internet: The Next Generation
by Conner-Sax, Kiersten. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 004.678 CON] (1).
|
|
20.
|
Database nation: Death of privacy in the 21st century
by Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 006.6 GAR] (1).
|