Results
|
|
351.
|
|
Image from Amazon.com
|
|
|
|
352.
|
|
Image from Amazon.com
|
|
|
|
353.
|
|
Image from Amazon.com
|
Practical internet security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
354.
|
|
Image from Amazon.com
|
Practical signcrption by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
355.
|
|
Image from Amazon.com
|
Pragmatic security metrices : appling metametrics to information security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
356.
|
|
|
Principles of data security by Series: Foundation of computer science
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Plenum Press 1982
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3 M2.
star rating
Average : 0.0 out of 5 stars
|
|
|
357.
|
|
|
Principles of information security. by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Australia Thomson 2005
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P5.
star rating
Average : 0.0 out of 5 stars
|
|
|
358.
|
|
Image from Amazon.com
|
Proceeding on information hiding by Series: Lecture notes in computer science; 1174
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 1996
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)p1,N96 N6.
star rating
Average : 0.0 out of 5 stars
|
|
|
359.
|
|
Image from Amazon.com
|
Proceeding: Computer saftey, reliability and secur by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D6,8(B):(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
360.
|
|
Image from Amazon.com
|
|
|
|
361.
|
|
Image from Amazon.com
|
|
|
|
362.
|
|
Image from Amazon.com
|
|
|
|
363.
|
|
Image from Amazon.com
|
|
|
|
364.
|
|
Image from Amazon.com
|
Protecting mobile networks and devices: Challenges and solutions by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:48M Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
365.
|
|
Image from Amazon.com
|
Protecting your PC by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Australia Cengage learning 2006
Availability: No items available.
star rating
Average : 0.0 out of 5 stars
|
|
|
366.
|
|
Image from Amazon.com
|
|
|
|
367.
|
|
Image from Amazon.com
|
Recent advances in intrusion detection by Series: Lecture notes in computer science; 2212
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
368.
|
|
Image from Amazon.com
|
Recent advances in intrusion detection by Series: Lecture notes in computer science; 2820
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
369.
|
|
Image from Amazon.com
|
Recent advances in intrusion detection by Series: Lecute notes in computer science; 2516
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P2 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
370.
|
|
Image from Amazon.com
|
REID security:techniques, protocols and system-on-chip design by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
371.
|
|
Image from Amazon.com
|
Reliability and availability of cloud computing by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey John Wiley 2012
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q2.
star rating
Average : 0.0 out of 5 stars
|
|
|
372.
|
|
Image from Amazon.com
|
Research advances in database and information systems security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boston Kluwer Academic Publishers 2000
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3:(894) P0.
star rating
Average : 0.0 out of 5 stars
|
|
|
373.
|
|
Image from Amazon.com
|
Research methods for cyber security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Cambridge Elsevier 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
374.
|
|
Image from Amazon.com
|
RFID protocol design,optimization, and security for the internet of things by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London Institution of Engineering and Technology 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
375.
|
|
|
|
|
|
376.
|
|
|
Risk management in action by Series: Computer security series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: England NCC Publication 1978
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3 L83.
star rating
Average : 0.0 out of 5 stars
|
|
|
377.
|
|
Image from Amazon.com
|
|
|
|
378.
|
|
Image from Amazon.com
|
|
|
|
379.
|
|
Image from Amazon.com
|
Role-based access control by Series: Artech House computer security series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boston Artech House 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
380.
|
|
Image from Amazon.com
|
Role-based access control by Series: Information security and privacy series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Norwood Artech House 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3:P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
381.
|
|
|
Secrets kand lies: Digital security in a networked world by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York John Wiley 2000
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P0.
star rating
Average : 0.0 out of 5 stars
|
|
|
382.
|
|
Image from Amazon.com
|
Secure and resilient software development by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)92:(894) Q0 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
383.
|
|
Image from Amazon.com
|
Secure computers and networks by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton C R C Press 2000
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P0.
star rating
Average : 0.0 out of 5 stars
|
|
|
384.
|
|
|
|
|
|
385.
|
|
Image from Amazon.com
|
|
|
|
386.
|
|
Image from Amazon.com
|
SecureCSocial: Secure cloud-based social network by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London World Scientific 2020
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7 R0.
star rating
Average : 0.0 out of 5 stars
|
|
|
387.
|
|
Image from Amazon.com
|
Securing cloud mobility : a practitioner's guide by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
388.
|
|
Image from Amazon.com
|
|
|
|
389.
|
|
Image from Amazon.com
|
Security and privacy for big data, cloud computing and applications by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Stevenage(UK) Institution of Engineering and Technology 2019
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q9.
star rating
Average : 0.0 out of 5 stars
|
|
|
390.
|
|
Image from Amazon.com
|
Security and quality of service in Ad Hoc wireless networks by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Cambridge Cambridge University Press 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
391.
|
|
Image from Amazon.com
|
Security complete by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi BPB Publications 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1.
star rating
Average : 0.0 out of 5 stars
|
|
|
392.
|
|
|
Security for computer networks by Series: Wiley series in computer
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Chichester John Wiley 1984
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3 M4.
star rating
Average : 0.0 out of 5 stars
|
|
|
393.
|
|
|
|
|
|
394.
|
|
Image from Amazon.com
|
Security for mobility by Series: IEE telecommunications series; 51
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London The Institution of Electrical Engineers 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:(894) P4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
395.
|
|
Image from Amazon.com
|
Security for service oriented architectures by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2014
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
396.
|
|
Image from Amazon.com
|
Security for software engineers by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2019
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q9 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
397.
|
|
Image from Amazon.com
|
Security for telecommunications networks by Series: Advances in information security
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,4:(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
398.
|
|
Image from Amazon.com
|
Security for wireless sensor networks by Series: Advances in information security; 28
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer-Science+Business Media 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,42:(894) P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
399.
|
|
Image from Amazon.com
|
Security for wireless sensor networks using Identiy-Based Cryptography by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Suite CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,42:(894) Q3.
star rating
Average : 0.0 out of 5 stars
|
|
|
400.
|
|
Image from Amazon.com
|
|