|
81.
|
Security engineering for service-oriented architectures
by Hafner, Michael | Breu, Ruth. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
|
|
82.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
83.
|
Handbook of information and communication security
by Stavroulakis, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
84.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|
|
85.
|
Trust Management IV
by Nishigaki, Masakatsu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
|
|
86.
|
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings
by Mathuria, Anish | Jha, Somesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
|
|
87.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
88.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
89.
|
Applications of data mining in computer security
by Barbara, Daniel | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
|
|
90.
|
Machine learning and data mining for computer security : methods and applications
by Maloof, Marcus A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
91.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
92.
|
Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers
by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
|
|
93.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
94.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
95.
|
Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project
by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
|
|
96.
|
Group privacy: new challenges of data technologies
by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
|
|
97.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
98.
|
Modelling and verification of secure exams
by Giustolisi, Rosario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
|
|
99.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
100.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|