61. What every librarian should know about electronic privacy

by Woodward, Jeannette.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
62. Information Assurance

by Blyth, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
63. Information warfare

by Ventre, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
64. World beyond digital rights management

by Umeh, Jude C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Swindon: British Computer Society, 2007Availability: Items available for loan: [Call number: 346.0482 UME] (1).
65. Attribute-based credentials for trust : identity in the information society

by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
66. Security, privacy and trust in modern data management

by Petkovic, Milan | Jonker, Willem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
67. Information hiding and applications

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
68. iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.

by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
69. Collaborative financial infrastructure protection : tools, abstractions, and middleware

by Baldoni, Roberto | Chockler, Gregory.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2012Availability: Items available for loan: [Call number: 005.8 BAL] (1).
70. Foundations of security analysis and design VI : FOSAD tutorial lectures

by Aldini, Alessandro | Gorrieri, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
71. Data protection for virtual data centers

by Buffington, Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2010Availability: Items available for loan: [Call number: 005.8 BUF] (1).
72. Advances in artificial intelligence for privacy protection and security

by Solanas, Agusti | Mart�nez-Balleste, Antoni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
73. Writing information security policies

by Barman, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: New Riders, 2002Availability: Items available for loan: [Call number: 005.8 BAR] (1).
74. Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers

by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
75. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
76. Detecting peripheral-based attacks on the host memory

by Stewin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2015Availability: Items available for loan: [Call number: 005.84 STE] (1).
77. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
78. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
79. Understanding high-dimensional spaces

by Skillicorn, David B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.3​12 SKI] (1).
80. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).

Powered by Koha