|
1.
|
How secure is your wireless network? : safeguarding your Wi-Fi-LAN
by Barken, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
2.
|
Cryptography and data security
by Denning, Dorothy E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
|
|
3.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
4.
|
Rootkits : subverting the windows kernel
by Hoglund, Greg | Butler, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
5.
|
Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
by Garrett, Paul | Garrett, Paul | Lieman, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
|
|
6.
|
Role-based access control
by Ferraiolo, David F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
7.
|
User's guide to cryptography and standards
by Mitchell, Chris J | Dent, Alexander W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
8.
|
Internet and intranet security management : risks and solutions
by Janczewski, Lech. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
|
|
9.
|
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by Boyd, Colin | Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
|
|
10.
|
Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
11.
|
Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings
by Franklin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 FRA] (1).
|
|
12.
|
Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings
by Jonker, Willem | Petkovic, Milan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
|
|
13.
|
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings
by Vigna, Giovanni | Jonsson, Erland | Kruegel, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 VIG] (1).
|
|
14.
|
Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001: Proceedings
by Kim, Kwangjo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 KIM] (1).
|
|
15.
|
Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings
by Naccache, David | Paillier,Pascal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
|
|
16.
|
Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001
by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
17.
|
Public-key cryptography
by Salomma, Arto. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
|
|
18.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
19.
|
Security assessment : case studies for implementing the NSA IAM
by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
20.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|