1. Trusted computing platforms : design and applications

by Smith, Sean W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
2. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
3. Digital Rights Management : Technological, Economic, Legal and Political Aspects

by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
4. Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings

by Davida, George | Frankel, Yair | Rees, Owen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
5. Security engineering : a guide to building dependable distributed systems

by Anderson, Ross J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 AND] (1).
6. Corporate computer and network security

by Panko, Raymond R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
7. CISSP Certification exam study guide

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
8. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
9. Security+

by Calvert, Ben | Boswell, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
10. Security in distributed computing : did you lock the door?

by Dempsey, Rob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
11. Computer security : principles and practice

by Stallings, Willam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
12. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
13. Elements of UML 2.0 style

by Ambler, Scott W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2005Availability: Items available for loan: [Call number: 005.1 AMB] (1).
14. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).

Powered by Koha