1. Crypto : how the code rebels beat the government - saving privacy in the digital age

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
2. Computer, ethics, and society

by Ermann, M. David | Ermann, M. David | Shauf, Michele | Shauf, Michele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 303.4834 ERM] (1).
3. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
4. Brute force : cracking the data encryption standard

by Curtin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
5. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
6. Trusted computing platforms : design and applications

by Smith, Sean W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
7. Computer Security in the 21st Century

by Shieh, S. P | Lee, D. T | Tygar, J. D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 LEE] (1).
8. Multimedia encryption and watermarking

by Furht, Borko | Muharemagic, Edin | Socek, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
9. Hop integrity in the Internet

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
10. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
11. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
12. Load Balancing Servers, Firewalls and Caches

by Kopparapu, Chandra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
13. Unwanted gaze : a dictionary of privacy in America

by Rosen, Jeffrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
14. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
15. Statistical methods in computer security

by Chen, William W. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
16. Enhanced methods in computer security, biometric and artificial intelligence systems

by Piegat, Andrzej | Pejas, Jerzy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Kluwer Academic Publishers, 2005Availability: Items available for loan: [Call number: 005.8 PEJ] (1).
17. Digital privacy : theory, technologies, and practices

by Acquisti, Alessandro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
18. Secure Systems Development with UML

by Jurjens, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).
19. Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings

by Qing, Sihan | Gollmann, Dieter | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 QIN] (1).
20. Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings

by Boyd, Colin | Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).

Powered by Koha