101. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
102. Access control systems : security, identity management and trust models

by Benantar, Messaoud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
103. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
104. Wireless networks : multiuser detection in cross-layer design

by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
105. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
106. Wireless network security

by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
107. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
108. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
109. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
110. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
111. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
112. Botnet detection : countering the largest security threat

by Lee, Wenke | Dagon, David | Wang, Cliff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
113. Network-aware security for group communications

by Sun, Yan | Liu, K. J. R | Trappe, Wade.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SUN] (1).
114. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
115. Network security

by Huang, Scott C | Du, Ding-Zhu | MacCallum, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
116. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
117. Secure multi-party non-repudiation protocols and applications

by Onieva, Jose A | Lopez, Javier | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
118. Intrusion detection systems

by Di Pietro, Roberto | Mancini, Luigi V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
119. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
120. Future of identity in the information society

by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).

Powered by Koha