1. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
2. Security in wireless ad hoc and sensor networks

by Cayirci, Erdal | Rong, Chunming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
3. Network security fundamentals

by Reese, Rachelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
4. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
5. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
6. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
7. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
8. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
9. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
10. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
11. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
12. Error correcting coding and security for data networks : analysis of the superchannel concept

by Kabatiansky, G | Krouk, E | Semenov, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 KAB] (1).
13. Web security sourcebook : a complete guide to web security threats and solutions

by Geer, Daniel | Ranum, Marcus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
14. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).

Powered by Koha