241. Security in RFID and sensor networks

by Zhang, Yan | Kitsos, Paris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 681.2 ZHA] (1).
242. Cryptanalysis of RSA and its variants

by Hinek, M. Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
243. Multidiciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
244. Architecting secure software systems

by Talukder, Asoke K | Chaitanya, Manish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
245. Remote sensing of global croplands for food security

by Thenkabail, Prasad S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 631.587 THE] (1).
246. Security in an IPv6 environment

by Minoli, Daniel | Kouns, Jake.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 MIN] (1).
247. IT risk : turning business threats into competitive advantage

by Westerman, George | Hunter, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Harvard Business School Press, 2007Availability: Items available for loan: [Call number: 658.4038 WES] (1).
248. Pro PHP security : from application security principles to the implementation of XSS defenses

by Snyder, Chris | Myer, Tom | Southwell, Michael G.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Apress, 2010Availability: Items available for loan: [Call number: 005.133 SNY] (1).
249. Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS

by Macaulay, Tyson | Singer, Bryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.478 MAC] (1).
250. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
251. Unauthorized access : the crisis in online privacy and security

by Sloan, Robert H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
252. Communication system security

by Chen, Lidong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 621.38928 CHE] (1).
253. Smart grid security : an end-to-end view of security in the new electrical grid

by Sorebo, Gilbert N | Echols, Michael C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 621.319 SOR] (1).
254. Anonymous communication networks : protecting privacy on the web

by Peng, Kun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 PEN] (1).
255. Encryption for digital content

by Kiayias, Aggelos | Kiayias, Aggelos | Pehlivanoglu, Serdar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KIA] (1).
256. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
257. Economics of information security and privacy III

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
258. Security and privacy in social networks

by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
259. Security for cloud storage systems

by Yang, Kan | Jia, Xiaohua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
260. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).

Powered by Koha