|
1.
|
Firewalls and VPNs : principles and practices
by Tibbs, Richard | Oakes, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
|
|
2.
|
Information hiding techniques for steganography and digital watermarking
by Katzenbeisser, Stefan | Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 KAT] (1).
|
|
3.
|
Demystifying the IPsec puzzle
by Frankel, Sheila. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 FRA] (1).
|
|
4.
|
Security fundamentals for e-commerce
by Hassler, Vesna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 HAS] (1).
|
|
5.
|
Techniques and applications of digital watermarking and content protection
by Arnold, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 ARN] (1).
|
|
6.
|
Internet and intranet security
by Oppliger, Rolf. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
7.
|
Non-Repudiation in electronic commerce
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
|
|
8.
|
Computer forensics and privacy
by Caloyannides, Michael A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 CAL] (1).
|
|
9.
|
Implementing security for ATM networks
by Tarman, Thomas D | Witzke, Edward L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 TAR] (1).
|
|
10.
|
Developing secure distributed systems with CORBA
by Lang, Ulrich | Schreiner, Rudolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 LAN] (1).
|
|
11.
|
Role-based access control
by Ferraiolo, David F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
12.
|
Bluetooth security
by Persson, Joakim | Smeets, Ben. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2004Availability: Items available for loan: [Call number: 005.8 GEH] (1).
|
|
13.
|
Contemporary cryptography
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.82 OPP] (1).
|
|
14.
|
Security in wireless LANs and MANs
by Hardjono, Thomas | Dondeti, Lakshminath R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
15.
|
Principles of computer security : security+ and beyond
by White, Gregory B | Cothren, Chuck | Williams, Dwayne. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
16.
|
Computer security lab manual
by Nestler, Vincent J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
|
|
17.
|
Computer security fundamentals
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
|
|
18.
|
Exploiting online games : cheating massively distributed systems
by Hoglund, Greg | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
19.
|
Software security : building security in
by McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
|
|
20.
|
Secure programming with static analysis
by Chess, Brian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
|