|
1.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
2.
|
Process of network security : designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
3.
|
Network Control and Engineering for QOS, Security and Mobility, III.
by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
|
|
4.
|
IM, instant messaging security
by Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
|
|
5.
|
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by Lioy, Antonio | Mazzocchi, Daniele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
|
|
6.
|
Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 ; proceedings
by Jakobsson, Markus | Yung, Moti | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JAK] (1).
|
|
7.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
8.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|
|
9.
|
Enterprise Security With EJB and CORBA
by Hartman, Bret. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
10.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
11.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
12.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
13.
|
Process of network security: Designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|