|
1.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
2.
|
Managing information systems security and privacy
by Trcek, Denis. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 005.8068 TRC] (1).
|
|
3.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
4.
|
Security assessment : case studies for implementing the NSA IAM
by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
5.
|
Art of deception : controlling the human element of security
by Simon, William L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
6.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
7.
|
New school of information security
by Shostack, Adam | Stewart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 658.478 SHO] (1).
|
|
8.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
9.
|
Myths of security : what the computer security industry doesn't want you to know
by Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 VIE] (1).
|
|
10.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
11.
|
Information systems security : security management, metrics, frameworks and best practices
by Godbole, Nina S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
|
|
12.
|
Principles of Information security
by Whitman, Michael E | Mattord, Herbert J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
13.
|
Advances in artificial intelligence for privacy protection and security
by Solanas, Agusti | Mart�nez-Balleste, Antoni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
14.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
15.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
16.
|
Privacy-preserving computing for big data analytics and AI
by Chen, Kai | Yang, Qiang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge : Cambridge University Press, 2022Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|