Your search returned 11 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.

by Easttom, Chuck.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : McGraw Hill Education, c.2016Availability: Items available for loan: [Call number: 005.82 EAS] (3).

Log in to add tags. Add to cart
Platform embedded security technology revealed : safeguarding the future of computing with intel embedded security and management engine / Xiaoyu Ruan.

by Ruan, Xiaoyu.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Apress Open, c.2014Availability: Items available for loan: [Call number: 005.8 RUA] (1).

Implementing database security and auditing : A guide for DBA's, information security administrators and auditors / Ron Ben Natan.

by Ben-Natan, Ron.

Edition: Reprint ed.Material type: book Book; Audience: Specialized; Publisher: New Delhi : Digital Press / Elsevier, 2014Availability: Items available for loan: [Call number: 005.8 BEN] (1).

Cryptography and information security / V. K. Pachghare.

by Pachghare, V. K.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New Delhi : PHI Learning Private Limited, c.2015Availability: Items available for loan: [Call number: 005.82 PAC] (1).

Traceback and anonymity / Xinyuan Wang, Douglas Reeves.

by Wang, Xinyuan (Computer scientist) | Reeves, Douglas S, 1953-.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Springer, c.2015Availability: Items available for loan: [Call number: 005.8 WAN] (1).

Security and access control using biometric technologies / Robert Newman.

by Newman, Robert C.

Edition: International ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston : Course Technology / Cengage Learning, c.2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano.

by Oriyano, Sean-Philip.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Burlington : Jones & Bartlett Learning, c.2014Availability: Items available for loan: [Call number: 621.38 ORI] (1).

Applied Oracle security : developing secure database and middleware environments / David C. Knox ... [et al.]

by Knox, David (David C.).

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Oracle Press / McGraw-Hill, c.2010Availability: Items available for loan: [Call number: 005.8 APP] (1).

Computer security : protecting digital resources / Robert C. Newman.

by Newman, Robert C.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Sudbury : Jones and Bartlett Publishers, c.2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).

Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, R. R.

Edition: 3rd ed., International ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River : Pearson Education, c.2013Availability: Items available for loan: [Call number: 005.8 BOY] (1).

Building secure defenses against code-reuse attacks / Lucas Davi

by Davi, Lucas | Sadeghi, Ahmad-Reza [author.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York Springer, 2015Availability: Items available for loan: [Call number: 005.8 DAV] (1).

Powered by Koha