|
1.
|
Austin protocol compiler
by McGuire, Tommy M | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.453 MCG] (1).
|
|
2.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
3.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
4.
|
Privacy preserving data mining
by Vaidya, Jaideep | Clifton, Christopher Wade | Zhu, Yu Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.74 VAI] (1).
|
|
5.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
6.
|
Security for wireless sensor networks
by Liu, Donggang | Ning, Peng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
|
|
7.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|
|
8.
|
Identifying malicious code through reverse engineering
by Singh, Baibhav | Singh, Abhishek. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).
|
|
9.
|
Data warehousing and data mining techniques for cyber security
by Singhal, Anoop. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
|
|
10.
|
Cryptographics : exploiting graphics cards for security
by Keromytis, Angelos D | Cook, Debra L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
|
|
11.
|
Electronic postage systems : technology, security, economics
by Bleumer, Gerrit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 383.0285 BLE] (1).
|
|
12.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|
|
13.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
14.
|
Secure localization and time synchronization for wireless sensor and ad hoc networks
by Poovendran, Radha. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
|
|
15.
|
Synchronizing Internet Protocol Security (SIPSec)
by Shoniregun, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 SHO] (1).
|
|
16.
|
Privacy-respecting intrusion detection
by Flegel, Ulrich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
|
|
17.
|
Botnet detection : countering the largest security threat
by Lee, Wenke | Dagon, David | Wang, Cliff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
18.
|
DNA computing models
by Ignatova, Zoya | Martinez-Perez, Israel | Zimmermann, Karl-Heinz. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.391 IGN] (1).
|
|
19.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
20.
|
Secure multi-party non-repudiation protocols and applications
by Onieva, Jose A | Lopez, Javier | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
|