281. Digital audio watermarking techniques and technologies : applications and benchmarks

by Cvejic, Nedeljko | Seppanen, Tapio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.82 CVE] (1).
282. Securing Web services : practical usage of standards and specifications

by Periorellis, Panos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
283. Watermarking in audio : key techniques and technologies

by He, Xing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Youngstown: Cambria Press, 2008Availability: Items available for loan: [Call number: 005.82 HEX] (1).
284. Web services security development and architecture : theoretical and practical issues

by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
285. Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web

by Last, Mark | Kandel, Abraham.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
286. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
287. Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamanig, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
288. Steganography and watermarking

by Yang, Ching-Nung | Chang, Chin-Chen | Lin, Chia-Chen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Nova Science Publishers, 2013Availability: Items available for loan: [Call number: 005.82 YAN] (1).
289. Future of the Internet and How to Stop it

by Zittrain, Jonathan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Penguin Books, 2008Availability: Items available for loan: [Call number: 004.6780112 ZIT] (1).
290. Embedded Java security : security for mobile devices

by Debbabi, Mourad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
291. Guide to computer network security

by Kizza, Joseph Migga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
292. Intrusion detection : a machine learning approach

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
293. Information warfare

by Ventre, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
294. Professional ASP. NET security

by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
295. Electronic projects for home security

by Bishop, Owen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: BPB Publications, 1992Availability: Items available for loan: [Call number: 621.38928 BIS] (1).
296. Wireless hacking : projects for wi-fi enthusiasts

by Barken, Lee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
297. Trusted computing for embedded systems

by Candaele, Bernard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8 CAN] (1).
298. Construction and analysis of safe, secure, and interoperable smart devices : international workshop,CASSIS 2004, Marseille, France, March 10-14, 2004 ; revised selected papers

by Burdy, Lilian | Barthe, Gilles | Huisman, Marieke | Huisman, Marieke.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 BAR] (1).
299. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
300. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).

Powered by Koha