|
101.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
102.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
103.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
104.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
105.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
106.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|
|
107.
|
Foundations of security analysis and design VI : FOSAD tutorial lectures
by Aldini, Alessandro | Gorrieri, Roberto. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
|
|
108.
|
Applied information security : a hands-on approach
by Basin, David | Schaller, Patrick | Schl�pfer, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
|
|
109.
|
Information systems security : security management, metrics, frameworks and best practices
by Godbole, Nina S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
|
|
110.
|
Protecting your PC
by Barile, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
|
|
111.
|
Network infrastructure security
by Weaver, Randy | Weaver, Dawn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
|
|
112.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
113.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
114.
|
Information security : a practical approach
by Bhaskar, S. M | Ahson, S. I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
|
|
115.
|
Code hacking : a developer's guide to network security
by Cordingley, Julian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
116.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
117.
|
Network security : issues, challenges and techniques
by Bhattacharyya, Dhruba K | Sarma, Nityananda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
|
|
118.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.82 STA] (1).
|
|
119.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
120.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|