41. Extrusion detection : security monitoring for internal intrusions

by Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
42. Brute force : cracking the data encryption standard

by Curtin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
43. Network Control and Engineering for QOS, Security and Mobility, III.

by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
44. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
45. Trusted computing platforms : design and applications

by Smith, Sean W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
46. Computer Security in the 21st Century

by Shieh, S. P | Lee, D. T | Tygar, J. D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 LEE] (1).
47. Multimedia encryption and watermarking

by Furht, Borko | Muharemagic, Edin | Socek, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
48. Hop integrity in the Internet

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
49. Privacy preserving data mining

by Vaidya, Jaideep | Clifton, Christopher Wade | Zhu, Yu Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.74 VAI] (1).
50. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
51. Security for wireless sensor networks

by Liu, Donggang | Ning, Peng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
52. AA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility

by Nakhjiri, Madjid | Nakhjiri, Mahsa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 NAK] (1).
53. GSM and UMTS : creation of global mobile communication

by Hillebrand, Friedhelm.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.3845 HIL] (2).
54. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
55. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
56. Building open source network security tools : components and techniques

by Schiffman, Mike D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
57. Wireless security essentials : defending mobile systems from data piracy

by Vines, Russell Dean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
58. IP-Based Next-Generation Wireless Networks : systems, architectures, and protocols

by Zhang, Tao | Chen, Jyh-Cheng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 004.68 CHE] (2).
59. Managing IP Networks : challenges and opportunities

by Aidarous, Salah | Plevyak, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-IEEE Press, 2003Availability: Items available for loan: [Call number: 004.62 AID] (1).
60. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).

Powered by Koha