61. Developing secure distributed systems with CORBA

by Lang, Ulrich | Schreiner, Rudolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 LAN] (1).
62. Role-based access control

by Ferraiolo, David F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
63. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
64. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
65. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
66. Cryptanalysis of Number Theoretic Ciphers

by Wagstaff, Samuel S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
67. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
68. Computer networking first-step

by Odom, Wendell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 004.6 ODO] (1).
69. Honeypots for Windows

by Grimes, Roger A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2005Availability: Items available for loan: [Call number: 005.8 GRI] (1).
70. Multimedia security : stenography and digital watermaking techniques for protection and intellectual property

by Lu, Chun-Shien.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 005.8 LUC] (1).
71. Web and information security

by Thuraisingham, Bhavani | Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
72. Privacy protection for e-services

by Yee, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
73. Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.

by Price, Mike | Foster, James C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
74. IT security project management : handbook

by Snedaker, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
75. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
76. Cisco security professional's guide to secure intrusion detection systems

by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
77. Technology and Privacy

by Agre, Philip E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
78. Cryptographic hardware and embedded systems - CHES 2002: 4th international workshop Redwood shores, CA, USA, August 13-15, 2002 revised papers

by Kaliski, Burton S | Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 KAL] (1).
79. Information hiding

by Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
80. Secure Systems Development with UML

by Jurjens, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).

Powered by Koha