81. Introduction to cryptography with Java applets

by Bishop, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
82. Computer networking illuminated

by Barrett, Diane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 004.6 BAR] (1).
83. Shellcoder's handbook : discovering and exploiting security holes

by Koziol, Jack | Aitel, Dave | Anley, Chris | Litchfield, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.8 KOZ] (1).
84. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
85. 2000 IEEE symposium on security and privacy

by Titsworth, Frances M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
86. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
87. Information hiding : steganography and watermarking, attacks and countermeasures

by Johnson, Neil F | Duric, Zoran | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Kluwer Academic Publishers, 2006Availability: Items available for loan: [Call number: 005.8 JOH] (1).
88. Statistical methods in computer security

by Chen, William W. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Marcel Dekker, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
89. Countering the new terrorism

by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).
90. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
91. Technical guide to IPSec virtual private networks

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
92. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
93. Multimedia security handbook

by Kirovski, Darko | Furht, Borko.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
94. Network security technologies

by Fung, Kwok T.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
95. Quantum communications and cryptography

by Sergienko, Alexander V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
96. Building trustworthy semantic webs

by Thuraisingham, Bhavani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 025.04 THU] (1).
97. Multimedia watermarking techniques and applications

by Furht, Borko | Kirovski, Darko.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 005.82 FUR] (1).
98. Cyber security : turning national solutions into international cooperation

by Lewis, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
Tags:
99. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
100. Data, Network, and Internet Communications Technology

by Elahi, Ata | Elahi, Mehran.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Delmar Learning, 2006Availability: Items available for loan: [Call number: 004.6 ELA] (1).

Powered by Koha