Results
|
1.
|
|
|
|
2.
|
|
|
|
3.
|
|
|
|
4.
|
|
|
|
5.
|
|
A practical guide to trusted computing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ: IBM Press/Pearson plc, 2008
Availability: No items available.
|
|
6.
|
|
|
|
7.
|
|
|
|
8.
|
|
|
|
9.
|
|
|
|
10.
|
|
|
|
11.
|
|
Advances in elliptic curve cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Cambridge: Cambridge University Press, 2005
Availability: No items available.
|
|
12.
|
|
An information security handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Berlin: Springer, 2001
Availability: No items available.
|
|
13.
|
|
|
|
14.
|
|
|
|
15.
|
|
Basic methods of cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Cambridge: Cambridge University Press, 1998
Availability: No items available.
|
|
16.
|
|
Beginning cryptography with Java by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2005
Availability: No items available.
|
|
17.
|
|
Best damn firewall book period by
Edition: 2nd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington, MA ; Oxford: Elsevier Science [distributor], Syngress, 2007
Availability: No items available.
|
|
18.
|
|
|
|
19.
|
|
Buffer overflow attacks : detect, exploit, prevent by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2005
Availability: Items available for loan: ACL (1)Call number: 005.84 FOS.
|
|
20.
|
|
|