1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
3. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
4. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
5. Core security patterns : best practices and strategies for J2EE, web services and identity management

by Steel, Christopher | Lai, Ray | Nagappan, Ramesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 STE] (1).
6. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
7. Security in computing

by Pfleeger, Charles P.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
8. Crypto : how the code rebels beat the government - saving privacy in the digital age

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
9. Computer, ethics, and society

by Ermann, M. David | Ermann, M. David | Shauf, Michele | Shauf, Michele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 303.4834 ERM] (1).
10. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
11. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
12. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
13. UNIX system security : a guide for users and system administrators

by Curry, David A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.43 CUR] (1).
14. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
15. Best truth: Intelligence in the information age

by Berkowitz, Bruce D | Goodman, Allan E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Yale University Press, 2000Availability: Items available for loan: [Call number: 005.8 BER] (1).
16. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
17. Secure architectures with openBSD

by Nazario, Jose | Palmer, Brandon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.432 PAL] (1).
18. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
19. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
20. Troubleshooting Linux firewalls.

by Shinn, Mike | Shinn, Michael | Shinn, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).

Powered by Koha