Your search returned 78 results.

Sort
Results
41.
Cryptography decrypted by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Addison Wesley, 2001
Availability: Items available for loan: ACL (1)Call number: 005.82 MEL.

42.
Cryptography and public key infrastructure on the Internet by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley, 2003
Availability: Items available for loan: ACL (1)Call number: 005.82 SCH.

43.
Curing the patch management headache by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 NIC.

44.
Cyber-development, cyber-democracy and cyber-defense : challenges, opportunities and implications for theory, policy and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York: Springer, 2014
Availability: Items available for loan: ACL (1)Call number: 303.4833 CAR.

45.
Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II : 5 and 8-9 April 2010, Orlando, Florida, United States by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bellingham, Wash: SPIE, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 BUF.

46.
Cyber crime and digital evidence by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, 2015
Availability: Items available for loan: ACL (1)Call number: 345.730268 TUM.

47.
Data protection and information lifecycle management by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 PET.

48.
Data protection : governance, risk management, and compliance by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Baca Raton, FL: Taylor & Francis, 2009
Availability: Items available for loan: ACL (1)Call number: 005.86 HIL.

49.
Data privacy and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 SAL.

50.
Data leaks for dummies(r) by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley Pub, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 BUN.

51.
Defeating the hacker : a non-technical guide to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 SCH.

52.
Decrypted secrets : methods and maxims of cryptology by
Edition: 3rd, rev. and updated ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 BAU.

53.
Designing security architecture solutions by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: John Wiley, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 RAM.

54.
Developing secure software by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia: Cengage Learning, 2008
Availability: Items available for loan: ACL (1)Call number: 005.1 GRE.

55.
Digital watermarking for digital media by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Pub, 2005
Availability: Items available for loan: ACL (1)Call number: 005.82 SEI.

56.
Digital watermarking and steganography : fundamentals and techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Baca Raton, FL: Taylor & Francis, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 SHI.

57.
Digital watermarking and steganography by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston: Morgan Kaufmann Publishers, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 COX.

58.
Digital signature schemes : general framework and fail-stop signatures by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 1996
Availability: Items available for loan: ACL (1)Call number: 005.82 PFI.

59.
Digital rights management for e-commerce systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Reference, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 TSO.

60.
Digital rights management : technological, economic, legal and political aspects by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 BEC.

Pages

Powered by Koha