141. Understanding voice over IP security

by Johnston, Alan B | Piscitello, David M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
142. Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.

by Price, Mike | Foster, James C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
143. IT security project management : handbook

by Snedaker, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
144. Communications and Networking : an introduction

by Cowley, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 004.6 COW] (1).
145. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
146. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
147. Developing Trust

by Curtin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Apress, 2002Availability: Items available for loan: [Call number: 005.8 CUR] (1).
148. Hack Proofing Your Wireless Network

by Barnes, Christian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, 2002Availability: Items available for loan: [Call number: 621.319 BAR] (1).
149. Cisco security professional's guide to secure intrusion detection systems

by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
150. Technology and Privacy

by Agre, Philip E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
151. Cryptographic hardware and embedded systems - CHES 2002: 4th international workshop Redwood shores, CA, USA, August 13-15, 2002 revised papers

by Kaliski, Burton S | Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 KAL] (1).
152. Information hiding

by Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
153. Secure Systems Development with UML

by Jurjens, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.117 JUR] (1).
154. Software security-theories and systems

by Okada, Mitsuhiro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
155. Personal Wireless Communications : IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003 : Proceedings

by Conti, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 CON] (1).
156. Computer Safety, Reliability, and Security : 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003 : Proceedings

by Anderson, Stuart | Felici, Massimo | Littlewood, Bev.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIT] (1).
157. Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings

by Qing, Sihan | Gollmann, Dieter | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 QIN] (1).
158. Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings

by Boyd, Colin | Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
159. Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding

by Lioy, Antonio | Mazzocchi, Daniele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIO] (1).
160. Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings

by Zhou, Jianying | Han, Youngfei | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).

Powered by Koha