61. Trust Management IV

by Nishigaki, Masakatsu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
62. Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings

by Mathuria, Anish | Jha, Somesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
63. Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

by Fischer-Hellmann, Klaus-Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Wiesbaden: Springer-Verlag, 2012Availability: Items available for loan: [Call number: 005.8 FIS] (1).
64. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
65. Computer networks

by Tanenbaum, Andrew S | Wetherall, David.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson, 2012Availability: Items available for loan: [Call number: 004.6 TAN] (1).
66. Snort cookbook

by Orebaugh, Angela | Babbin, Jacob | Biles, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
67. Computer Networks

by Tanenbaum, Andrew S.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.6 TAN] (4). Items available for reference: [Call number: 004.6 TAN] (2).
68. LDAP Directories Explained : an introduction and analysis

by Arkills, Brian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 004.62 ARK] (1).
69. Microsoft Windows 2000 Security

by Internet Security System Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.8 INT] (1).
70. Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : Revised Papers

by Johansson, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
71. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
72. Hacker's handbook : the strategy behind breaking into and defending networks

by Susan Young | Aitel, Dav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
73. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
74. Framing privacy in digital collections with ethical decision making

by Dressler, Virginia [Author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: s.l. : Morgan & Claypool, 2018Availability: Items available for loan: [Call number: 323.448 DRE] (1).
75. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
76. Digital logic design and computer organization with computer architecture for security

by Faroughi, Nikrouz.

Publisher: New York : McGraw-Hill Education, 2015Availability: Items available for loan: [Call number: 004.22 FAR] (1).
77. Information systems security: 6th international conference, ICISS 2010, gandhinagar, india, december 2010 proceedings

by Jha, Somesh | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Springer Berlin Heidelberg, 2010 HeidelbergAvailability: Items available for loan: [Call number: 004 JHA] (1).

Powered by Koha