1. How secure is your wireless network? : safeguarding your Wi-Fi-LAN

by Barken, Lee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
2. Cryptography and data security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
3. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
4. Virtual Private Networks: Technologies and solutions

by Yuan, Ruixi | Strayer, W. Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 004.6 YUA] (1).
5. Rootkits : subverting the windows kernel

by Hoglund, Greg | Butler, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
6. Extrusion detection : security monitoring for internal intrusions

by Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
7. OFDM wireless LANs: A theoretical and practical guide

by Terry, John | Heiskala, Juha.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2001Availability: Items available for loan: [Call number: 004.68 TER] (1).
8. Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland

by Garrett, Paul | Garrett, Paul | Lieman, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
9. Role-based access control

by Ferraiolo, David F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
10. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
11. Legal framework for security in European health care telematics

by Rienhoff, Otto | Laske, Caroline | Van Eecke, Patrick | Wenzlaff, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2000Availability: Items available for loan: [Call number: 362.1 RIE] (1).
12. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
13. Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings

by Boyd, Colin | Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
14. Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 CHR] (1).
15. Advances in cryptology : CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings

by Franklin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 FRA] (1).
16. Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings

by Jonker, Willem | Petkovic, Milan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
17. Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings

by Vigna, Giovanni | Jonsson, Erland | Kruegel, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 VIG] (1).
18. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001: Proceedings

by Kim, Kwangjo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 KIM] (1).
19. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
20. Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings

by Naccache, David | Paillier,Pascal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).

Powered by Koha