Your search returned 5 results.

Not what you expected? Check for suggestions
Sort
Results
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971-
  • Clark, Gregory (Gregory S.)
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis : John Wiley & Sons, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 LII.

Platform embedded security technology revealed : safeguarding the future of computing with intel embedded security and management engine / Xiaoyu Ruan. by
  • Ruan, Xiaoyu
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : Apress Open, c.2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 RUA.

Implementing database security and auditing : A guide for DBA's, information security administrators and auditors / Ron Ben Natan. by
  • Ben-Natan, Ron
Edition: Reprint ed.
Material type: Text Text; Audience: Specialized;
Publication details: New Delhi : Digital Press / Elsevier, 2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 BEN.

Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. by
  • Easttom, Chuck
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw Hill Education, c.2016
Availability: Items available for loan: Central Library (3)Call number: 005.82 EAS, ...

Applied Cryptography : Protocols, Algorithms and Source Code in C / Bruce Schneier. by
  • Schneier, Bruce, 1963-
Edition: 20th anniversary ed.
Material type: Text Text; Literary form: ; Audience: Specialized;
Publication details: Hoboken : John Wiley & Sons, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.82 SCH.

Pages