|
121.
|
Role-based access control
by Ferraiolo, David F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
122.
|
Bluetooth security
by Persson, Joakim | Smeets, Ben. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2004Availability: Items available for loan: [Call number: 005.8 GEH] (1).
|
|
123.
|
Wireless communications security
by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
|
|
124.
|
User's guide to cryptography and standards
by Mitchell, Chris J | Dent, Alexander W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
125.
|
Security in wireless LANs and MANs
by Hardjono, Thomas | Dondeti, Lakshminath R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
126.
|
IT and security comparison decision support system for wireless LANs
by Reynolds, Kevin T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Universal Publishers, 2004Availability: Items available for loan: [Call number: 004.68 REY] (1).
|
|
127.
|
Computer forensics : computer crime scene investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
128.
|
Software vulnerability guide
by Thompson, Herbert H | Chase, Scott G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
|
|
129.
|
Cryptanalysis of Number Theoretic Ciphers
by Wagstaff, Samuel S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
|
|
130.
|
RSA and public-key cryptography
by Mollin, Richard | Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
|
|
131.
|
Applied public key infrastructure : 4th International Workshop : IWAP 2005
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
|
|
132.
|
Computer networking first-step
by Odom, Wendell. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 004.6 ODO] (1).
|
|
133.
|
Honeypots for Windows
by Grimes, Roger A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2005Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
134.
|
Hardening apache
by Mobily, Tony. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.713769 MOB] (1).
|
|
135.
|
Multimedia security : stenography and digital watermaking techniques for protection and intellectual property
by Lu, Chun-Shien. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 005.8 LUC] (1).
|
|
136.
|
Advances in security and payment methods for mobile commerce
by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
|
|
137.
|
Web and information security
by Thuraisingham, Bhavani | Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
138.
|
Tools for Teaching Computer Networking and Hardware Concepts
by Sarkar, Nurul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2006Availability: Items available for loan: [Call number: 004.607122 SAR] (1).
|
|
139.
|
Privacy protection for e-services
by Yee, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
|
|
140.
|
PGP & GPG : email for the practical paranoid
by Lucas, Michael W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2006Availability: Items available for loan: [Call number: 004.692 LUC] (1).
|