1. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
2. Managing information systems security and privacy

by Trcek, Denis.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 005.8068 TRC] (1).
3. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
4. Security assessment : case studies for implementing the NSA IAM

by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
5. Art of deception : controlling the human element of security

by Simon, William L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
6. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
7. New school of information security

by Shostack, Adam | Stewart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 658.478 SHO] (1).
8. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
9. Myths of security : what the computer security industry doesn't want you to know

by Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 VIE] (1).
10. Information warfare

by Ventre, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
11. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
12. Principles of Information security

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 WHI] (1).
13. Advances in artificial intelligence for privacy protection and security

by Solanas, Agusti | Mart�nez-Balleste, Antoni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
14. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
15. Secure networked inference with unreliable data sources

by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
16. Privacy-preserving computing for big data analytics and AI

by Chen, Kai | Yang, Qiang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).

Powered by Koha