|
81.
|
Introduction to cryptography with Java applets
by Bishop, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
82.
|
Computer networking illuminated
by Barrett, Diane. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 004.6 BAR] (1).
|
|
83.
|
Shellcoder's handbook : discovering and exploiting security holes
by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
|
|
84.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
85.
|
2000 IEEE symposium on security and privacy
by Titsworth, Frances M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New york: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
|
|
86.
|
Contemporary cryptology : the science of information integrity
by Simmons, Gustavus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
|
|
87.
|
Information hiding : steganography and watermarking, attacks and countermeasures
by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
|
|
88.
|
Statistical methods in computer security
by Chen, William W. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
89.
|
Countering the new terrorism
by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).
|
|
90.
|
Public key infrastructure : building trusted applications and web services
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
91.
|
Technical guide to IPSec virtual private networks
by Tiller, James S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
|
|
92.
|
Disruptive security technologies with mobile code and peer to peer networks
by Brooks, Richard R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
93.
|
Multimedia security handbook
by Kirovski, Darko | Furht, Borko. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
|
|
94.
|
Network security technologies
by Fung, Kwok T. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
95.
|
Quantum communications and cryptography
by Sergienko, Alexander V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
|
|
96.
|
Building trustworthy semantic webs
by Thuraisingham, Bhavani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 025.04 THU] (1).
|
|
97.
|
Multimedia watermarking techniques and applications
by Furht, Borko | Kirovski, Darko. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 005.82 FUR] (1).
|
|
98.
|
Cyber security : turning national solutions into international cooperation
by Lewis, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
|
|
99.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
100.
|
Data, Network, and Internet Communications Technology
by Elahi, Ata | Elahi, Mehran. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Delmar Learning, 2006Availability: Items available for loan: [Call number: 004.6 ELA] (1).
|