1. Software security-theories and systems

by Okada, Mitsuhiro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
2. Biometric authentication : ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 ; proceedings

by Maltoni, Davide | Jain, Anil Kumar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 MAL] (1).
3. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
4. Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

by Moskowitz, I. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
5. Security protocols : 7th international workshop Cambridge, UK, April 19-21, 1999 Proceedings

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 CHR] (1).
6. PHP fast and easy web development

by Meloni, Julie C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.754 MEL] (4).
7. Instant Enterprise Java Beans

by Tremblett, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.73 TRE] (2).
8. IPSec: securing VPNs

by Davis, Carlton R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
9. NFS Illustrated

by Callaghan, Brent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.62 CAL] (1).
10. Computer network time synchronization : the network time protocol

by Mills, David L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press/Taylor & Francis, 2006Availability: Items available for loan: [Call number: 004.6 MIL] (1).
11. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
12. Progress in Cryptology -- INDOCRYPT 2003

by Johansson, Thomas | Maitra, Subhamoy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
13. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
14. Operating System Concepts

by Silberschatz, Abraham | Galvin, Peter B | Gagne, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: wiley, 2012Availability: Items available for reference: [Call number: 005.43 SIL] (1).
15. Password

by Eve, Martin Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 005.8 EVE] (1).
16. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
17. IP routing protocols : fundamentals and distance-vector routing protocols

by Aweya, James.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 004.665 AWE] (1).
18. Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us

by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
19. Practical mathematical cryptography

by Gjosteen, Kristian.

Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
20. Secure web application development : a hands-on guide with Python and Django

by Baker, Matthew.

Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.8 BAK] (1).

Powered by Koha