161. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
162. Power analysis attacks : revealing the secrets of smart cards

by Mangard, Stefan | Oswald, Elisabeth | Popp, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 MAN] (1).
163. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
164. Secure localization and time synchronization for wireless sensor and ad hoc networks

by Poovendran, Radha.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
165. Synchronizing Internet Protocol Security (SIPSec)

by Shoniregun, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 SHO] (1).
166. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
167. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
168. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
169. Botnet detection : countering the largest security threat

by Lee, Wenke | Dagon, David | Wang, Cliff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
170. Network-aware security for group communications

by Sun, Yan | Liu, K. J. R | Trappe, Wade.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SUN] (1).
171. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
172. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
173. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
174. Network security

by Huang, Scott C | Du, Ding-Zhu | MacCallum, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
175. Wireless Communications : 2007 CNIT Thyrrenian Symposium

by Puppolin, Silvano.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.38438 PUP] (1).
176. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
177. Secure multi-party non-repudiation protocols and applications

by Onieva, Jose A | Lopez, Javier | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
178. Intrusion detection systems

by Di Pietro, Roberto | Mancini, Luigi V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 PIE] (1).
179. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
180. Future of identity in the information society

by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).

Powered by Koha