1. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
2. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
3. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
4. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
5. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
6. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
7. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
8. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
9. Applied information security : a hands-on approach

by Basin, David | Schaller, Patrick | Schl�pfer, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 005.8 BAS] (1).
10. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.82 STA] (1).

Powered by Koha