121. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
122. Information security illuminated

by Chapple, Mike | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
123. Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers

by Dingledine, Roger | Syverson, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
124. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
125. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
126. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
127. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
128. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
129. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
130. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
131. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
132. Modelling and verification of secure exams

by Giustolisi, Rosario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 005.8 GIU] (1).
133. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
134. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
135. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
136. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
137. NTP security : a quick-start guide

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).

Powered by Koha