1. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
2. Security in computing

by Pfleeger, Charles P.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
3. Creating Location Services for the Wireless Web

by Hjelm, Johan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.319 HJE] (2).
4. Unwanted gaze : a dictionary of privacy in America

by Rosen, Jeffrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
5. 2000 IEEE symposium on security and privacy

by Titsworth, Frances M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
6. Digital privacy : theory, technologies, and practices

by Acquisti, Alessandro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 ACQ] (1).
7. End of privacy : how total surveillance is becoming a reality

by Whitaker, Reg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: New Press, 1999Availability: Items available for loan: [Call number: 323.448 WHI] (1).
8. Practical Web Traffic Analysis : standards, privacy, techniques, results

by Fletcher, Peter | Comber, Peter | Pearce, Ben | Poon, Alex.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.K.: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004.678 FLE] (1).
9. Privacy protection for e-services

by Yee, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 005.8 YEE] (1).
10. Developing Trust

by Curtin, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Apress, 2002Availability: Items available for loan: [Call number: 005.8 CUR] (1).
11. Technology and Privacy

by Agre, Philip E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 AGR] (1).
12. Software security-theories and systems

by Okada, Mitsuhiro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 OKA] (1).
13. Privacy enhancing technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004; revised selected papers

by Martin, David | Serjantov, Andrei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 MAR] (1).
14. IT-security and privacy : design and use of privacy-enhancing security mechanisms

by Fischer-Hubner, Simone.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2001Availability: Items available for loan: [Call number: 004 FIS] (1).
15. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
16. Information Security and Privacy

by Pieprzyk, Josef | Seberry, Jennifer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
17. Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999

by Imai, Hideki | Zheng, Yuliang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
18. Spychips : how major corporations and government plan to track your every move with RFID

by Albrecht, katherine | McIntyre, Liz.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education Asia, 2006Availability: Items available for loan: [Call number: 323.4482 ALB] (1).
19. Whole Internet: The Next Generation

by Conner-Sax, Kiersten.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 004.678 CON] (1).
20. Database nation: Death of privacy in the 21st century

by Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 006.6 GAR] (1).

Powered by Koha