|
1.
|
Understanding Data Communications and Networks
by Shay, William A. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 004.6 SHA] (1).
|
|
2.
|
IM, instant messaging security
by Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
|
|
3.
|
Lectures on data security : modern cryptology in theory and practice
by Damgard, Ivan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1990Availability: Items available for loan: [Call number: 004 DAM] (1).
|
|
4.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
5.
|
Cryptography For Visual Basic: A Programmer's Guide to the Microsoft CryptoAPI
by Bondi, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.82 BON] (2).
|
|
6.
|
Securing VoIP networks : threats, vulnerabilities, and countermeasures
by Thermos, Peter | Takanen, Ari. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.695 THE] (1).
|
|
7.
|
Handbook of database security : applications and trends
by Jajodia, Sushil | Gertz, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
8.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
9.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
10.
|
Trust Management III
by Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005 FER] (1).
|
|
11.
|
Windows server 2008 : networking and network access protection (NAP)
by Davies, Joseph | Northrup, Tony | Microsoft Corporation. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 004.6844 DAV] (2).
|
|
12.
|
DNS security management
by Dooley, Michael | Rooney, Timothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
|
|
13.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
14.
|
Understanding high-dimensional spaces
by Skillicorn, David B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.312 SKI] (1).
|
|
15.
|
New solutions for cybersecurity
by Shrobe, Howard | Shrier, David L | Pentland, Alex. Publisher: London MIT Press 2017Availability: Items available for loan: [Call number: 658.478 SHR] (1).
|
|
16.
|
Topics in cryptology - CT-RSA 2016 : the Cryptographers' Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
by Sako, Kazue. Publisher: Berlin Springer 2016Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
17.
|
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by Jarvis, Craig. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
|
|
18.
|
Sensors, cloud, and fog : the enabling technologies for the internet of things
by Misra, Sudip | Sarkar, Subhadeep | Chatterjee, Subarna. Publisher: 2019 Taylor & Francis Group, Boca RatonAvailability: Items available for loan: [Call number: 004.678 MIS] (1).
|