|
61.
|
Trust Management IV
by Nishigaki, Masakatsu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
|
|
62.
|
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings
by Mathuria, Anish | Jha, Somesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
|
|
63.
|
Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
by Fischer-Hellmann, Klaus-Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wiesbaden: Springer-Verlag, 2012Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|
|
64.
|
Public-key cryptography : theory and practice
by Das, Abhijit | Madhavan, C. E. Veni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
|
|
65.
|
Computer networks
by Tanenbaum, Andrew S | Wetherall, David. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2012Availability: Items available for loan: [Call number: 004.6 TAN] (1).
|
|
66.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
67.
|
Computer Networks
by Tanenbaum, Andrew S. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.6 TAN] (4). Items available for reference: [Call number: 004.6 TAN] (2).
|
|
68.
|
LDAP Directories Explained : an introduction and analysis
by Arkills, Brian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 004.62 ARK] (1).
|
|
69.
|
Microsoft Windows 2000 Security
by Internet Security System Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
|
|
70.
|
Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers
by Johansson, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
|
|
71.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
72.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|
|
73.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
74.
|
Framing privacy in digital collections with ethical decision making
by Dressler, Virginia [Author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: s.l. : Morgan & Claypool, 2018Availability: Items available for loan: [Call number: 323.448 DRE] (1).
|
|
75.
|
How cybersecurity really works : a hands-on guide for total beginners
by Grubb, Sam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
|
|
76.
|
Digital logic design and computer organization with computer architecture for security
by Faroughi, Nikrouz. Publisher: New York : McGraw-Hill Education, 2015Availability: Items available for loan: [Call number: 004.22 FAR] (1).
|
|
77.
|
Information systems security: 6th international conference, ICISS 2010, gandhinagar, india, december 2010 proceedings
by Jha, Somesh | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Springer Berlin Heidelberg, 2010 HeidelbergAvailability: Items available for loan: [Call number: 004 JHA] (1).
|