21. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
22. Hop integrity in the Internet

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
23. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
24. Security for wireless sensor networks

by Liu, Donggang | Ning, Peng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
25. AA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility

by Nakhjiri, Madjid | Nakhjiri, Mahsa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 NAK] (1).
26. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
27. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
28. Building open source network security tools : components and techniques

by Schiffman, Mike D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
29. Wireless security essentials : defending mobile systems from data piracy

by Vines, Russell Dean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
30. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
31. Implementing SSH : strategies for optimizing the secure shell

by Dwivedi, Himanshu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
32. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
33. PC pest control : protect your computers from malicious internet invaders.

by Gralla, Preston.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
34. Peter Norton's network security fundamentals

by Norton, Peter | Stockman, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
35. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
36. Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption

by Remy, David | Rosenberg, Jothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
37. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
38. Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security

by Chandra, Praphul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).
39. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
40. Countering the new terrorism

by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).

Powered by Koha