Results
|
41.
|
|
Cryptography decrypted by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston: Addison Wesley, 2001
Availability: Items available for loan: ACL (1)Call number: 005.82 MEL.
|
|
42.
|
|
|
|
43.
|
|
Curing the patch management headache by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 NIC.
|
|
44.
|
|
|
|
45.
|
|
|
|
46.
|
|
Cyber crime and digital evidence by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London, 2015
Availability: Items available for loan: ACL (1)Call number: 345.730268 TUM.
|
|
47.
|
|
Data protection and information lifecycle management by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 PET.
|
|
48.
|
|
|
|
49.
|
|
Data privacy and security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Berlin: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 SAL.
|
|
50.
|
|
Data leaks for dummies(r) by
Edition: 1st ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, NJ: Wiley Pub, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 BUN.
|
|
51.
|
|
|
|
52.
|
|
Decrypted secrets : methods and maxims of cryptology by
Edition: 3rd, rev. and updated ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Berlin: Springer, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 BAU.
|
|
53.
|
|
Designing security architecture solutions by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, NJ: John Wiley, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 RAM.
|
|
54.
|
|
Developing secure software by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Australia: Cengage Learning, 2008
Availability: Items available for loan: ACL (1)Call number: 005.1 GRE.
|
|
55.
|
|
Digital watermarking for digital media by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hershey, PA: Information Science Pub, 2005
Availability: Items available for loan: ACL (1)Call number: 005.82 SEI.
|
|
56.
|
|
|
|
57.
|
|
Digital watermarking and steganography by
Edition: 2nd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Amsterdam ; Boston: Morgan Kaufmann Publishers, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 COX.
|
|
58.
|
|
|
|
59.
|
|
Digital rights management for e-commerce systems by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hershey, PA: Information Science Reference, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 TSO.
|
|
60.
|
|
|