1. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
2. Advances in security and payment methods for mobile commerce

by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
3. Trust and privacy in digital business : first international conference, Trustbus 2004, Zaragoza, Spain, August 30 - September 1, 2004 ; proceedings

by Katsikas, Sokratis | Lopez, Javier | Pernul, Gunther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 KAT] (1).
4. E-commerce agents : marketplace solutions, security issues, and suply and demand

by Ye, Yiming | Liu, Jiming | Ye, Yiming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2001Availability: Items available for loan: [Call number: 006.3 LIU] (1).
5. Trust and risk in Internet commerce

by Camp, L. Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
6. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
7. Secure multi-party non-repudiation protocols and applications

by Onieva, Jose A | Lopez, Javier | Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
8. Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence

by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
9. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
10. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
11. Digital identity management : technological, business, and social implications

by Birch, David G. W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
12. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
13. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).

Powered by Koha