Refine your search

Your search returned 107 results.

Not what you expected? Check for suggestions
Sort
Results
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. by
  • Easttom, Chuck
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw Hill Education, c.2016
Availability: Items available for loan: Central Library (3)Call number: 005.82 EAS, ...

Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971-
  • Clark, Gregory
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : Wiley, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 LII.

Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez. by
  • Schou, Corey
  • Hernandez, Steven
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw Hill Education, c.2015
Availability: Items available for loan: Central Library (1)Call number: 658.478 SCH.

Cloud management and security / Imad M. Abbadi. by
  • Abbadi, Imad M
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : Wiley, c.2014
Availability: Items available for loan: Central Library (1)Call number: 004.6782 ABB.

Smart grid security : innovative solutions for a modernized grid / edited by Florian Skopik, Paul Smith. by
  • Skopik, Florian [editor.]
  • Smith, Paul [editor.]
Series: Syngress Advanced Topics in Information Security
Source: Safari Technical Books (Current File)
Source: eBook - Computer Science 2015 [EBCCS15]
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Syngress / Elsevier, c.2015
Availability: Items available for loan: Central Library (1)Call number: 621.319 SMA.

Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / [editors] Heung Youl Youm, Moti Yung. by
  • WISA 2009 (2009 : Pusan, Korea)
  • Youm, Heung Youl [editor.]
  • Yung, Moti [editor.]
Series: Lecture notes in computer science ; 5932. | LNCS sublibrary: SL 4-security and cryptology
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Berlin : Springer-Verlag, c.2009
Availability: Items available for loan: Central Library (1)Call number: 005.8 INF.

Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971-
  • Clark, Gregory (Gregory S.)
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis : John Wiley & Sons, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 LII.

Applied Cryptography : Protocols, Algorithms and Source Code in C / Bruce Schneier. by
  • Schneier, Bruce, 1963-
Edition: 20th anniversary ed.
Material type: Text Text; Literary form: ; Audience: Specialized;
Publication details: Hoboken : John Wiley & Sons, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.82 SCH.

Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi. by
  • Workman, Michael D, 1957-
  • Phelps, Daniel C
  • Gathegi, John Ng'ang'a
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Burlington : Jones & Bartlett Learning, c.2013
Availability: Items available for loan: Central Library (1)Call number: 658.478 WOR.

Cybersecurity : managing systems, conducting testing, and investigating intrusions / Thomas J. Mowbray. by
  • Mowbray, Thomas J
Edition: 1st edition.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis : John Wiley & Sons, c.2014
Availability: Items available for loan: Central Library (1)Call number: 352.379 MOW.

Platform embedded security technology revealed : safeguarding the future of computing with intel embedded security and management engine / Xiaoyu Ruan. by
  • Ruan, Xiaoyu
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : Apress Open, c.2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 RUA.

Implementing database security and auditing : A guide for DBA's, information security administrators and auditors / Ron Ben Natan. by
  • Ben-Natan, Ron
Edition: Reprint ed.
Material type: Text Text; Audience: Specialized;
Publication details: New Delhi : Digital Press / Elsevier, 2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 BEN.

Cryptography and information security / V. K. Pachghare. by
  • Pachghare, V. K
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : PHI Learning Private Limited, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.82 PAC.

Traceback and anonymity / Xinyuan Wang, Douglas Reeves. by
  • Wang, Xinyuan (Computer scientist)
  • Reeves, Douglas S, 1953-
Series: SpringerBriefs in computer science
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : Springer, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 WAN.

Security and access control using biometric technologies / Robert Newman. by
  • Newman, Robert C
Edition: International ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Boston : Course Technology / Cengage Learning, c.2010
Availability: Items available for loan: Central Library (1)Call number: 005.8 NEW.

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano. by
  • Oriyano, Sean-Philip
Series: Jones & Bartlett Learning information systems security & assurance series
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Burlington : Jones & Bartlett Learning, c.2014
Availability: Items available for loan: Central Library (1)Call number: 621.38 ORI.

Applied Oracle security : developing secure database and middleware environments / David C. Knox ... [et al.] by
  • Knox, David (David C.)
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : Oracle Press / McGraw-Hill, c.2010
Availability: Items available for loan: Central Library (1)Call number: 005.8 APP.

Computer security : protecting digital resources / Robert C. Newman. by
  • Newman, Robert C
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Sudbury : Jones and Bartlett Publishers, c.2010
Availability: Items available for loan: Central Library (1)Call number: 005.8 NEW.

Corporate computer security / Randall J. Boyle, Raymond R. Panko. by
  • Boyle, Randall J
  • Panko, R. R
Edition: 3rd ed., International ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Upper Saddle River : Pearson Education, c.2013
Availability: Items available for loan: Central Library (1)Call number: 005.8 BOY.

Building secure defenses against code-reuse attacks / Lucas Davi by
  • Davi, Lucas
  • Sadeghi, Ahmad-Reza [author.]
Series: SpringerBriefs in computer science
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York Springer, 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 DAV.

Pages