1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
3. Security in computing

by Pfleeger, Charles P.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
4. Unwanted gaze : a dictionary of privacy in America

by Rosen, Jeffrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
5. Shellcoder's handbook : discovering and exploiting security holes

by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
6. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
7. Information hiding : steganography and watermarking, attacks and countermeasures

by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
8. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
9. Digital watermarking

by Miller, Matthew L | Bloom, Jeffrey A | Cox, Ingemar J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 005.8 COX] (2).
10. Information hiding techniques for steganography and digital watermarking

by Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 KAT] (1).
11. Techniques and applications of digital watermarking and content protection

by Arnold, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 ARN] (1).
12. Computer forensics and privacy

by Caloyannides, Michael A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 CAL] (1).
13. Privacy protection for e-services

by Yee, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
14. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
15. Technology and Privacy

by Agre, Philip E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
16. Information hiding

by Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
17. Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers

by Chae, Kijoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
18. Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers

by Lim, Chae Hoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
19. Digital Rights Management : Technological, Economic, Legal and Political Aspects

by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
20. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).

Powered by Koha