41. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
42. Technical guide to IPSec virtual private networks

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
43. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
44. Multimedia security handbook

by Kirovski, Darko | Furht, Borko.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
45. Network security technologies

by Fung, Kwok T.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
46. Quantum communications and cryptography

by Sergienko, Alexander V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
47. Multimedia watermarking techniques and applications

by Furht, Borko | Kirovski, Darko.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 005.82 FUR] (1).
48. Cyber security : turning national solutions into international cooperation

by Lewis, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
Tags:
49. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
50. IM, instant messaging security

by Rittinghouse, John W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
51. Policy-Based Network Management : solutions for the next generation

by Strassner, John C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2003Availability: Items available for loan: [Call number: 004.6 STR] (1).
52. Security fundamentals for e-commerce

by Hassler, Vesna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 HAS] (1).
53. Smart card security and applications

by Hendry, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 621.38928 HEN] (1).
54. Internet and intranet security

by Oppliger, Rolf.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
55. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
56. Multicast and group security

by Hardjono, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 HAR] (1).
57. Bluetooth security

by Persson, Joakim | Smeets, Ben.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2004Availability: Items available for loan: [Call number: 005.8 GEH] (1).
58. Wireless communications security

by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
59. Security in wireless LANs and MANs

by Hardjono, Thomas | Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
60. IT and security comparison decision support system for wireless LANs

by Reynolds, Kevin T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Universal Publishers, 2004Availability: Items available for loan: [Call number: 004.68 REY] (1).

Powered by Koha