|
61.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
62.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
63.
|
Open source systems security certification
by Damiani, Ernesto | Ardagna, Claudio Agostino | Ioini, Nabil El. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 DAM] (1).
|
|
64.
|
Future of identity in the information society
by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|
|
65.
|
Secure key establishment
by Choo, Kim-Kwang Raymond. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
|
|
66.
|
Cryptographic security architecture : design and verification
by Gutmann, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
|
|
67.
|
Multimedia data hiding
by Wu, Min | Liu, Bede. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
|
|
68.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
69.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
70.
|
Identity based encryption
by Chatterjee, Sanjit | Sarkar, Palash. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
|
|
71.
|
Physical unclonable functions in theory and practice
by Hofer, Maximilian | Bohm, Christoph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.3815 BOH] (1).
|
|
72.
|
Dynamic secrets in communication security
by Xiao, Sheng | Gong, Weibo | Towsley, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
|
|
73.
|
Information Assurance
by Blyth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
|
|
74.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
75.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
76.
|
Construction and analysis of safe, secure, and interoperable smart devices : international workshop,CASSIS 2004, Marseille, France, March 10-14, 2004 ; revised selected papers
by Burdy, Lilian | Barthe, Gilles | Huisman, Marieke | Huisman, Marieke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 BAR] (1).
|
|
77.
|
Grid computing security
by Chakrabarti, Anirban. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
78.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
79.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
80.
|
Security in computing systems : challenges, approaches and solutions
by Biskup, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|