21. Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers

by Chae, Kijoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
22. Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings

by Jonker, Willem | Petkovic, Milan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
23. Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers

by Lim, Chae Hoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
24. Digital Rights Management : Technological, Economic, Legal and Political Aspects

by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
25. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
26. Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

by Moskowitz, I. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
27. Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings

by Davida, George | Frankel, Yair | Rees, Owen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
28. Information Security and Privacy

by Pieprzyk, Josef | Seberry, Jennifer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
29. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
30. Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings

by Aucsmith, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
31. Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets

by Wallace, Michael | Webber, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
32. International conference on information security, ICIS-2005, December 7-9, 2005, proceedings

by Aghila, G | Gnanadass, R | Pondicherry Engineering College, Pondicherry | Sudha, Gnanou Florence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Allied Publishers, 2005Availability: Items available for loan: [Call number: 005.8 AGH] (1).
33. Software forensics : collecting evidence from the scene of a digital crime

by Slade, Robert M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
34. Information assurance for the enterprise : a roadmap to information security

by Schou, Corey | Shoemaker, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
35. Computer security lab manual

by Nestler, Vincent J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
36. Hacking exposed Cisco networks : Cisco security secrets & solutions

by Vladimirov, Andrew A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
37. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
38. Computer security : 20 things every employee should know

by Rothke, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
39. Digital watermarking and steganography

by Cox, Ingemar J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
40. Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

by Skoudis, Ed | Liston, Tom.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).

Powered by Koha