|
41.
|
Extrusion detection : security monitoring for internal intrusions
by Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
|
|
42.
|
Brute force : cracking the data encryption standard
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
|
|
43.
|
Network Control and Engineering for QOS, Security and Mobility, III.
by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
|
|
44.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
45.
|
Trusted computing platforms : design and applications
by Smith, Sean W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
46.
|
Computer Security in the 21st Century
by Shieh, S. P | Lee, D. T | Tygar, J. D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
47.
|
Multimedia encryption and watermarking
by Furht, Borko | Muharemagic, Edin | Socek, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
|
|
48.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
49.
|
Privacy preserving data mining
by Vaidya, Jaideep | Clifton, Christopher Wade | Zhu, Yu Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.74 VAI] (1).
|
|
50.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
51.
|
Security for wireless sensor networks
by Liu, Donggang | Ning, Peng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
|
|
52.
|
AA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
by Nakhjiri, Madjid | Nakhjiri, Mahsa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 NAK] (1).
|
|
53.
|
GSM and UMTS : creation of global mobile communication
by Hillebrand, Friedhelm. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.3845 HIL] (2).
|
|
54.
|
Internet security : cryptographic principles, algorithms, and protocols
by Rhee, Man Young. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
|
|
55.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
56.
|
Building open source network security tools : components and techniques
by Schiffman, Mike D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
57.
|
Wireless security essentials : defending mobile systems from data piracy
by Vines, Russell Dean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
|
|
58.
|
IP-Based Next-Generation Wireless Networks : systems, architectures, and protocols
by Zhang, Tao | Chen, Jyh-Cheng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 004.68 CHE] (2).
|
|
59.
|
Managing IP Networks : challenges and opportunities
by Aidarous, Salah | Plevyak, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-IEEE Press, 2003Availability: Items available for loan: [Call number: 004.62 AID] (1).
|
|
60.
|
Computer security handbook
by Bosworth, Seymour | Kabay, M. E. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
|