41. PC pest control : protect your computers from malicious internet invaders.

by Gralla, Preston.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
42. Peter Norton's network security fundamentals

by Norton, Peter | Stockman, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
43. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
44. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
45. Unwanted gaze : a dictionary of privacy in America

by Rosen, Jeffrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
46. Introduction to cryptography with Java applets

by Bishop, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
47. Shellcoder's handbook : discovering and exploiting security holes

by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
48. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
49. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
50. Information hiding : steganography and watermarking, attacks and countermeasures

by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
51. Statistical methods in computer security

by Chen, William W. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
52. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
53. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
54. Enhanced methods in computer security, biometric and artificial intelligence systems

by Piegat, Andrzej | Pejas, Jerzy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Kluwer Academic Publishers, 2005Availability: Items available for loan: [Call number: 005.8 PEJ] (1).
55. Digital privacy : theory, technologies, and practices

by Acquisti, Alessandro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
56. IM, instant messaging security

by Rittinghouse, John W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
57. Digital watermarking

by Miller, Matthew L | Bloom, Jeffrey A | Cox, Ingemar J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 005.8 COX] (2).
58. Information hiding techniques for steganography and digital watermarking

by Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 KAT] (1).
59. Techniques and applications of digital watermarking and content protection

by Arnold, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 ARN] (1).
60. Computer forensics and privacy

by Caloyannides, Michael A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 CAL] (1).

Powered by Koha