121. Role-based access control

by Ferraiolo, David F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
122. Bluetooth security

by Persson, Joakim | Smeets, Ben.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2004Availability: Items available for loan: [Call number: 005.8 GEH] (1).
123. Wireless communications security

by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
124. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
125. Security in wireless LANs and MANs

by Hardjono, Thomas | Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
126. IT and security comparison decision support system for wireless LANs

by Reynolds, Kevin T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Universal Publishers, 2004Availability: Items available for loan: [Call number: 004.68 REY] (1).
127. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
128. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
129. Cryptanalysis of Number Theoretic Ciphers

by Wagstaff, Samuel S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
130. RSA and public-key cryptography

by Mollin, Richard | Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
131. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
132. Computer networking first-step

by Odom, Wendell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 004.6 ODO] (1).
133. Honeypots for Windows

by Grimes, Roger A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2005Availability: Items available for loan: [Call number: 005.8 GRI] (1).
134. Hardening apache

by Mobily, Tony.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.713769 MOB] (1).
135. Multimedia security : stenography and digital watermaking techniques for protection and intellectual property

by Lu, Chun-Shien.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 005.8 LUC] (1).
136. Advances in security and payment methods for mobile commerce

by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
137. Web and information security

by Thuraisingham, Bhavani | Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
138. Tools for Teaching Computer Networking and Hardware Concepts

by Sarkar, Nurul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2006Availability: Items available for loan: [Call number: 004.607122 SAR] (1).
139. Privacy protection for e-services

by Yee, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
140. PGP & GPG : email for the practical paranoid

by Lucas, Michael W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2006Availability: Items available for loan: [Call number: 004.692 LUC] (1).

Powered by Koha