005.8 In8 2008
Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini.
Axe 3rd Floor Stacks:Available
2008
005.8 K116e 2007 : Kadrich, Mark.
Endpoint security / Mark Kadrich.
Axe 3rd Floor Stacks:Available
2007
005.8 K159i 2008 : Katz, Jonathan,
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.
Axe 3rd Floor Stacks:Available
2008
005.8 K658c : Kizza, Joseph Migga.
Computer network security and cyber ethics / by Joseph Migga Kizza.
Axe 3rd Floor Stacks:Available
2001
005.8 L498p 2006 : Ledford, Jerri L.
The personal cybersecurity Bible / Jerri L. Ledford.
Axe 3rd Floor Stacks:Available
2006
005.8 L579c : Levy, Steven.
Crypto : how the code rebels beat the government, saving privacy in the digital age / Steven Levy.
Axe 3rd Floor Stacks:Available
2001
005.8 L74c 2009 : Liu, Dale.
Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu
Axe 3rd Floor Stacks:Available
2009
005.8 L742s 2011 : Liu, Lei,
Security and policy driven computing / Lei Liu.
Axe 3rd Floor Stacks:Available
2011
005.8 M127o 2007 : McCarthy, Linda.
Own your space : keep yourself and your stuff safe online / Linda McCarthy.
Axe 3rd Floor Stacks:Available
2007
005.8 M178s 2006 : McGraw, Gary,
Software security : building security in / Gary McGraw.
Axe 3rd Floor Stacks:Available
2006
005.8 N389 2011
Network security, administration, and management : advancing technology and practice / Dulal Chandra
Axe 3rd Floor Stacks:Available
2011
005.8 N467c 2010 : Newman, Robert C.
Computer security : protecting digital resources / Robert C. Newman.
Axe 3rd Floor Stacks:Available
2010
005.8 On2w 2003 : O'Neill, Mark.
Web services security / Mark O'Neill ... [et al].
Axe 3rd Floor Stacks:Available
2003
005.8 P194c 2004 : Panko, R. R.
Corporate computer and network security / Raymond R. Panko.
Axe 3rd Floor Stacks:Available
2003
005.8 P483s 2003 : Pfleeger, Charles P.,
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
2003
005.8 P483s 2007 : Pfleeger, Charles P.,
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
2007
005.8 P538h 2010 : Philipp, Aaron.
Hacking exposed : computer forensics / Aaron Philipp, David Cowen, Chris Davis.
Axe 3rd Floor Stacks:Available
2010
005.8 P599f 2003 : Pieprzyk, Josef,
Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.
Axe 3rd Floor Stacks:Available
2003
005.8 P939 2011
Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leona
Axe 3rd Floor Stacks:Available
2011
005.8 R126i 2010 : Raggad, Bel G.
Information security management : concepts and practice / Bel G. Raggad.
Axe 3rd Floor Stacks:Available
2010
005.8 Sch58d 2015 : Schneier, Bruce,
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.
Axe 3rd Floor Stacks:Available
2015
005.8 Sd46 2007 : SDM 2007
Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee
Axe 3rd Floor Stacks:Available
2007
005.8 Sd46 2010 : SDM 2010
Secure data management : 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010 : proceedings / W
Axe 3rd Floor Stacks:Available
2010
005.8 Se26 2004
The Secure online business handbook : e-Commerce, IT functionality, & business continuity / [consulta
Axe 3rd Floor Stacks:Available
2004
005.8 Se262c 2012
Securing the clicks : network security in the age of social media / Gary Bahadur ... [et al.].
Axe 3rd Floor Stacks:Available
2012
005.8 Se263 2007
Security, privacy and trust in modern data management / Milan Petkovic, Willem Jonker (eds.).
Axe 3rd Floor Stacks:Available
2007
005.8 Sh44h 2003 : Shema, Mike.
Hacknotes web security portable reference / Mike Shema.
Axe 3rd Floor Stacks:Available
2003
005.8 Sl12s 2004 : Slade, Robert.
Software forensics : collecting evidence from the scene of a digital crime / Robert M. Slade.
Axe 3rd Floor Stacks:Available
2004
005.8 So47c 2011 : Solomon, Michael
Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett.
Axe 3rd Floor Stacks:Available
2011
005.8 Sp32p 2002 : Speed, Tim.
The personal Internet security guidebook : keeping hackers and crackers out of your home / Timothy Sp
Axe 3rd Floor Stacks:Available
2002
005.8 Sz56a 2005 : Szor, Peter.
The art of computer virus research and defense / Peter Szor.
Axe 3rd Floor Stacks:Available
2005
005.8 T635d 2011 : Torrenzano, Richard.
Digital assassination : protecting your reputation, brand, or business against online attacks / Richa
Axe 3rd Floor Stacks:Available
2011
005.8 V887c 2007 : Volonino, Linda.
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; cont
Axe 3rd Floor Stacks:Available
2007
005.8023 M228c 2007 : McMillan, Troy.
Change your career. Computer network security as your new profession / Troy McMillan.
Axe 3rd Floor Stacks:Available
2007
005.8068 If5s 2005 : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems
Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG
Axe 3rd Floor Stacks:Available
2005
005.82 B326d 2007 : Bauer, Friedrich Ludwig,
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer.
Axe 3rd Floor Stacks:Available
2007
005.82 B934r : Burnett, Steve.
RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.
Axe 3rd Floor Stacks:Available
2001
005.82 C392i 2011 : Chatterjee, Sanjit.
Identity-based encryption / Sanjit Chatterjee, Palash Sarkar.
Axe 3rd Floor Stacks:Available
2011
005.82 C889 2003
Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003 : p
Axe 3rd Floor Stacks:Available
2003
005.82 C94b 2005 : Curtin, Matt.
Brute force : cracking the data encryption standard / Matt Curtin.
Axe 3rd Floor Stacks:Available
2005
005.82 Eu74a 2004 : EUROCRYPT 2004
Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of
Axe 3rd Floor Stacks:Available
2004
005.82 K798a : Koblitz, Neal,
Algebraic aspects of cryptography / Neal Koblitz ; with 7 figures.
Axe 3rd Floor Stacks:Available
1999
005.82 L961b : Lubbe, J. C. A. van der
Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee.
Axe 3rd Floor Stacks:Available
1998
005.82 St25i 2011 : Stanoyevitch, Alexander.
Introduction to cryptography with mathematical foundations and computer implementations / Alexander S
Axe 3rd Floor Stacks:Available
2011
005.82 St57c : Stinson, Douglas R.
Cryptography : theory and practice / Douglas R. Stinson.
Axe 3rd Floor Stacks:Available
1995
005.82 T689i : Trappe, Wade.
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington.
Axe 3rd Floor Stacks:Available
2002
005.82 W813c 2007 : Wobst, Reinhard.
Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.
Axe 3rd Floor Stacks:Available
2007
005.8203 En19 2005
Encyclopedia of cryptography and security / editor-in-chief, Henk C.A. van Tilborg.
Axe 3rd Floor Stacks:Available
2005
005.820951 P943 2004
Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen.
Axe 3rd Floor Stacks:Available
2004
005.824 L373i 2019 : Laurence, Tiana,
Introduction to blockchain technology : the many faces of blockchain technology in the 21st century /
Axe 3rd Floor Stacks:Available
2019
Add Marked to Bag
Add All On Page