1. Understanding Data Communications and Networks

by Shay, William A.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 004.6 SHA] (1).
2. IM, instant messaging security

by Rittinghouse, John W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2005Availability: Items available for loan: [Call number: 004.692 RIT] (1).
3. Lectures on data security : modern cryptology in theory and practice

by Damgard, Ivan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1990Availability: Items available for loan: [Call number: 004 DAM] (1).
4. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
5. Cryptography For Visual Basic: A Programmer's Guide to the Microsoft CryptoAPI

by Bondi, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.82 BON] (2).
6. Securing VoIP networks : threats, vulnerabilities, and countermeasures

by Thermos, Peter | Takanen, Ari.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.695 THE] (1).
7. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
8. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
9. Web application vunerabilities : detect, exploit, prevent

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
10. Trust Management III

by Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005 FER] (1).
11. Windows server 2008 : networking and network access protection (NAP)

by Davies, Joseph | Northrup, Tony | Microsoft Corporation.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 004.6844 DAV] (2).
12. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
13. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
14. Understanding high-dimensional spaces

by Skillicorn, David B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.3​12 SKI] (1).
15. New solutions for cybersecurity

by Shrobe, Howard | Shrier, David L | Pentland, Alex.

Publisher: London MIT Press 2017Availability: Items available for loan: [Call number: 658.478 SHR] (1).
16. Topics in cryptology - CT-RSA 2016 : the Cryptographers' Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

by Sako, Kazue.

Publisher: Berlin Springer 2016Availability: Items available for loan: [Call number: 005.82 SAK] (1).
17. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
18. Sensors, cloud, and fog : the enabling technologies for the internet of things

by Misra, Sudip | Sarkar, Subhadeep | Chatterjee, Subarna.

Publisher: 2019 Taylor & Francis Group, Boca RatonAvailability: Items available for loan: [Call number: 004.678 MIS] (1).

Powered by Koha