41. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
42. State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997

by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
43. Decrypted Secrets

by Bauer, Friedrich L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
44. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
45. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
46. Classical introduction to cryptography : applications for communications security

by Vaudenay, Serge.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
47. Data warehousing and data mining techniques for cyber security

by Singhal, Anoop.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
48. Digital signatures

by Katz, Jonathan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAT] (1).
49. Classical introduction to cryptography exercise book

by Baigneres, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
50. Electronic postage systems : technology, security, economics

by Bleumer, Gerrit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 383.0285 BLE] (1).
51. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
52. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
53. Online business security systems

by Williams, Godfried B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 WIL] (1).
54. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
55. Privacy-preserving data mining : models and algorithms

by Aggarwal, Charu C | Yu, Philip S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
56. Secure integrated circuits and systems

by Verbauwhede, Ingrid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 621.3815 VER] (1).
57. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
58. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
59. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
60. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).

Powered by Koha