1. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
2. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
3. Load Balancing Servers, Firewalls and Caches

by Kopparapu, Chandra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
4. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
5. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
6. Computer security

by Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 1999Availability: Items available for loan: [Call number: 005.8 GOL] (2).
7. Shellcoder's handbook : discovering and exploiting security holes

by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
8. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
9. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
10. Designing security architecture solutions

by Ramachandran, Jay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
11. Practical cryptography

by Schneier, Bruce | Ferguson, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
12. Computer security

by Gollmann, Dieter.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 GOL] (1).
13. Trust, complexity and control confidence in a convergent world

by Cofta, Piotr.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 COF] (1).
14. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
15. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
16. Information technology security and risk management

by Slay, Jill | Koronios, Andy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Milton: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 SLA] (1).
17. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
18. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
19. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
20. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).

Powered by Koha