1. Advances in computers : information security. Volume 60

by Zelkowitz, Marvin V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004 ZEL] (1).
2. Social Life of Information

by Brown, John Seely | Duguid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Harvard Business School Press, 2000Availability: Items available for loan: [Call number: 303.48 BRO] (1).
3. Web and information security

by Thuraisingham, Bhavani | Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: IRM Press, 2006Availability: Items available for loan: [Call number: 005.8 FER] (1).
4. Tools for Teaching Computer Networking and Hardware Concepts

by Sarkar, Nurul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2006Availability: Items available for loan: [Call number: 004.607122 SAR] (1).
5. Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers

by Lim, Chae Hoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
6. Distributed Computing - IWDC 2004 : sixth International workshop, Kolkata, India, December 27-30, 2004 ; proceedings

by Nabanita, Das | Das, Sajal K | Sen, Arunabha | Sinha, Bhabani P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 DAS] (1).
7. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
8. CISSP Certification exam study guide

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
9. Electronic healthcare information security

by Dube, Kudakwashe | Mtenzi, Fredrick | Shoniregun, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 610.285 SHO] (1).
10. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
11. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
12. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
13. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
14. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
15. Internet infrastructure security

by Chakrabarti, Anirban | Manimaran, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 621.3192 CHA] (1).
16. Security and information assurance

by Malek, Manu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2003Availability: Items available for loan: [Call number: 005.8 MAL] (1).
17. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).

Powered by Koha