Your search returned 78 results.

Sort
Results
1.
A classical introduction to cryptography exercise book by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2006
Availability: No items available.

2.
A classical introduction to cryptography : applications for communications security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2005
Availability: No items available.

3.
A guide to kernel exploitation : attacking the core by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston: Syngress, 2011
Availability: No items available.

4.
A guide to information security management by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Palgrave, 2002
Availability: No items available.

5.
A practical guide to trusted computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: IBM Press/Pearson plc, 2008
Availability: No items available.

6.
A practical guide to security engineering and information assurance by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2002
Availability: No items available.

7.
Absolute beginner's guide to security, spam, spyware and viruses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Que, 2006
Availability: No items available.

8.
Administering Windows Vista security : the big surprises by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley/Sybex, 2007
Availability: No items available.

9.
Advanced host intrusion prevention with CSA by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Cisco Press, 2006
Availability: No items available.

10.
Advanced communications and multimedia security : IFIP TC6/TC11 sixth joint working conference on communications and multimedia Security, September 26-27, 2002, Portorož, Slovenia by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Kluwer Academic Publishers, 2002
Availability: No items available.

11.
Advances in elliptic curve cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge: Cambridge University Press, 2005
Availability: No items available.

12.
An information security handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2001
Availability: No items available.

13.
Analyzing computer security : a threat/vulnerability/countermeasure approach by
Edition: Indian edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, 2014
Availability: No items available.

14.
Applications of data mining in computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Kluwer Academic Publishers, 2002
Availability: No items available.

15.
Basic methods of cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge: Cambridge University Press, 1998
Availability: No items available.

16.
Beginning cryptography with Java by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2005
Availability: No items available.

17.
Best damn firewall book period by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA ; Oxford: Elsevier Science [distributor], Syngress, 2007
Availability: No items available.

18.
Bignum math implementing cryptographic multiple precision arithmetic by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Pub, 2006
Availability: No items available.

19.
Buffer overflow attacks : detect, exploit, prevent by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2005
Availability: Items available for loan: ACL (1)Call number: 005.84 FOS.

20.
Building secure software how to avoid security problems the right way by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Addison Wesley, 2002
Availability: Items available for loan: ACL (1)Call number: QA76.76.D47 V857 2001 005.1.

Pages

Powered by Koha