|
1.
|
Trusted computing platforms : design and applications
by Smith, Sean W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
2.
|
Computer security handbook
by Bosworth, Seymour | Kabay, M. E. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
|
|
3.
|
Digital Rights Management : Technological, Economic, Legal and Political Aspects
by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
|
|
4.
|
Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings
by Davida, George | Frankel, Yair | Rees, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
|
|
5.
|
Security engineering : a guide to building dependable distributed systems
by Anderson, Ross J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 AND] (1).
|
|
6.
|
Corporate computer and network security
by Panko, Raymond R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
|
|
7.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|
|
8.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
9.
|
Security+
by Calvert, Ben | Boswell, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
10.
|
Security in distributed computing : did you lock the door?
by Dempsey, Rob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
11.
|
Computer security : principles and practice
by Stallings, Willam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
12.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
13.
|
Elements of UML 2.0 style
by Ambler, Scott W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2005Availability: Items available for loan: [Call number: 005.1 AMB] (1).
|
|
14.
|
Security engineering: a guide to building dependable distributed systems
by Anderson, Ross J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
|