21. Practical intrusion detection handbook

by Proctor, Paul E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
22. Access denied : the practice and policy of global Internet filtering

by Deibert, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2008Availability: Items available for loan: [Call number: 005.8 DEI] (1).
23. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
24. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
25. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
26. Cryptology unlocked

by Wobst, Reinhard | Shafir, Angelika.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
27. Elliptic curve public key cryptosystems

by Menezes, Alfred J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
28. 802.1X port-based authentification

by Brown, Edwin Lyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
29. Mechanics of user identification and authentication : fundamentals of identity management

by Todorov, Dobromir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
30. Multidiciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
31. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
32. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
33. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
34. Access control, security, and trust : a logical approach

by Older, Susan | Chin, Shiu-Kai.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 CHI] (1).
35. Linux firewalls : attack detection and response with iptables, psad, and fwsnort

by Rash, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
36. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
37. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
38. Net delusion : the dark side of internet freedom

by Morozov, Evgeny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: PublicAffairs, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
39. Net delusion : how not to liberate the world

by Morozov, Evgeny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Allen Lane, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
40. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).

Powered by Koha