121. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
122. Elsevier's dictionary of information security in English, German, French and Russian

by Radichkova, B | Manoilov, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
123. Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence

by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
124. Security in wireless ad hoc and sensor networks

by Cayirci, Erdal | Rong, Chunming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
125. Network security fundamentals

by Reese, Rachelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
126. Implementing 802.1X security solutions for wired and wireless networks

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
127. Security of information and communication networks

by Kartalopoulos, Stamatios V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
128. Schneier on security

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
129. Security in a Web 2.0+ world : a standards based approach

by Solari, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 005.8 SOL] (1).
130. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
131. Innocent code : a security wake up call for Web programmers.

by Huseby, Sverre H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 HUS] (1).
132. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
133. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
134. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
135. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
136. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
137. Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

by Buttyan, Levente | Hubaux, Jean-Pierre.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
138. Security and quality of service in ad hoc wireless networks

by Mishra, Amitabh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
139. Digital identity management : technological, business, and social implications

by Birch, David G. W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
140. Security monitoring

by Fry, Chris | Nystrom, Martin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).

Powered by Koha