|
21.
|
Practical intrusion detection handbook
by Proctor, Paul E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
22.
|
Access denied : the practice and policy of global Internet filtering
by Deibert, Ronald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2008Availability: Items available for loan: [Call number: 005.8 DEI] (1).
|
|
23.
|
Privacy-respecting intrusion detection
by Flegel, Ulrich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
|
|
24.
|
Trust Management
by Etalle, Sandro | Marsh, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
|
|
25.
|
Modern cryptology : a tutorial
by Brassard, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
|
|
26.
|
Cryptology unlocked
by Wobst, Reinhard | Shafir, Angelika. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
|
|
27.
|
Elliptic curve public key cryptosystems
by Menezes, Alfred J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
|
|
28.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
29.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
30.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
31.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
32.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
33.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
34.
|
Access control, security, and trust : a logical approach
by Older, Susan | Chin, Shiu-Kai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 CHI] (1).
|
|
35.
|
Linux firewalls : attack detection and response with iptables, psad, and fwsnort
by Rash, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
36.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
37.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
38.
|
Net delusion : the dark side of internet freedom
by Morozov, Evgeny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: PublicAffairs, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
|
|
39.
|
Net delusion : how not to liberate the world
by Morozov, Evgeny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Allen Lane, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
|
|
40.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|