21. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
22. Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption

by Remy, David | Rosenberg, Jothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
23. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
24. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
25. Technical guide to IPSec virtual private networks

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
26. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
27. Network security technologies

by Fung, Kwok T.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
28. Cyber security : turning national solutions into international cooperation

by Lewis, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
Tags:
29. Policy-Based Network Management : solutions for the next generation

by Strassner, John C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2003Availability: Items available for loan: [Call number: 004.6 STR] (1).
30. Internet and intranet security

by Oppliger, Rolf.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
31. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
32. Multicast and group security

by Hardjono, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 HAR] (1).
33. Security in wireless LANs and MANs

by Hardjono, Thomas | Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
34. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
35. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
36. Advances in security and payment methods for mobile commerce

by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
37. Web and information security

by Thuraisingham, Bhavani | Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
38. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
39. Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding

by Lioy, Antonio | Mazzocchi, Daniele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
40. Trust and privacy in digital business : first international conference, Trustbus 2004, Zaragoza, Spain, August 30 - September 1, 2004 ; proceedings

by Katsikas, Sokratis | Lopez, Javier | Pernul, Gunther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 KAT] (1).

Powered by Koha