1. Technical guide to IPSec virtual private networks

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
2. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
3. Network and parallel computing : IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, proceedings

by Hai, Jin | Chen, Hao | Gao, Guang R | Xu, Zhiwei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JIN] (1).
4. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
5. SSL and TLS : designing and building secure systems

by Rescorla, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
6. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
7. Protocol : how control exists after decentralization

by Galloway, Alexander R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
8. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
9. 802.1X port-based authentification

by Brown, Edwin Lyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
10. Security in an IPv6 environment

by Minoli, Daniel | Kouns, Jake.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 MIN] (1).
11. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
12. SSL and TLS : theory and practice

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
13. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
14. Security for web services and service-oriented architectures

by Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
15. Network security : a practical approach

by Harrington, Jan L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
16. SOA security

by Kanneganti, Ramarao.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2008Availability: Items available for loan: [Call number: 005.8 KAN] (1).
17. Trust and security in collaborative computing

by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
18. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).

Powered by Koha