|
1.
|
Software security-theories and systems
by Okada, Mitsuhiro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
|
|
2.
|
Biometric authentication : ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 ; proceedings
by Maltoni, Davide | Jain, Anil Kumar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 MAL] (1).
|
|
3.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
4.
|
Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
by Moskowitz, I. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
|
|
5.
|
Security protocols : 7th international workshop Cambridge, UK, April 19-21, 1999 Proceedings
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
6.
|
PHP fast and easy web development
by Meloni, Julie C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.754 MEL] (4).
|
|
7.
|
Instant Enterprise Java Beans
by Tremblett, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.73 TRE] (2).
|
|
8.
|
IPSec: securing VPNs
by Davis, Carlton R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
9.
|
NFS Illustrated
by Callaghan, Brent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.62 CAL] (1).
|
|
10.
|
Computer network time synchronization : the network time protocol
by Mills, David L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press/Taylor & Francis, 2006Availability: Items available for loan: [Call number: 004.6 MIL] (1).
|
|
11.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|
|
12.
|
Progress in Cryptology -- INDOCRYPT 2003
by Johansson, Thomas | Maitra, Subhamoy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
|
|
13.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
14.
|
Operating System Concepts
by Silberschatz, Abraham | Galvin, Peter B | Gagne, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: wiley, 2012Availability: Items available for reference: [Call number: 005.43 SIL] (1).
|
|
15.
|
Password
by Eve, Martin Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 005.8 EVE] (1).
|
|
16.
|
How cybersecurity really works : a hands-on guide for total beginners
by Grubb, Sam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
|
|
17.
|
IP routing protocols : fundamentals and distance-vector routing protocols
by Aweya, James. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 004.665 AWE] (1).
|
|
18.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|
|
19.
|
Practical mathematical cryptography
by Gjosteen, Kristian. Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
|
|
20.
|
Secure web application development : a hands-on guide with Python and Django
by Baker, Matthew. Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.8 BAK] (1).
|