Refine your search

Your search returned 424 results.

Not what you expected? Check for suggestions
Cryptography and network security (E-Book_ principles and practices / William Stallings

by Stallings, William.

Edition: 2. ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, cop. 1999Availability: Items available for loan: (1).
Guide to elliptic curve cryptography (E-Book) Darrel Hankerson, Scott Vanstone, Alfred J. Menezes

by Hankerson, Darrel R | Menezes, A. J, 1965- [aut] | Vanstone, Scott A [aut].

Publisher: New York : Springer, 2004Availability: Items available for loan: (1).
Practical cryptography (E-Book) Niels Ferguson, Bruce Schneier

by Ferguson, Niels | Schneier, Bruce, 1963-.

Publisher: New York ; Chichester : Wiley, cop. 2003Availability: Items available for loan: (1).
Modern Cryptography (E-Book) theory and practice / Wenbo Mao

by Mao, Wenbo | Hewlett-Packard.

Publisher: Upper Saddle River, NJ : Prentice Hall, cop 2004Availability: Items available for loan: (1).
Applied cryptography (E-Book) protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: (1).
Computer, Internet and Network Systems Security (E-BOOK) S.K.PARMAR,

Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PAR (3).
Cryptography and network security (E-BOOK) principles and practice / William Stallings.

by Stallings, William | Stallings, William.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 STA (1).
Network security bible (E-BOOK) Eric Cole, Ronald Krutz, and James W. Conley.

by Cole, Eric | Conley, James W | Krutz, Ronald L, 1938-.

Publisher: Indianapolis, IN : Wiley Pub., c2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ERI (1).
Maximum security (E-BOOk) a hacker's guide to protecting your Internet site and network / Anonymous.

Edition: 1st ed. Publisher: Indianapolis, Ind. : Sams.net, c1997Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SEC (1).
Cryptography and network security (E-Book) principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed. Publisher: Boston : Prentice Hall, c2011Availability: Items available for loan: (1).
Developing secure distributed applications with CORBA (E-Book) Ulrich Lang, Rudolf Schreiner

by Lang, Ulrich | Schreiner, Rudolf.

Publisher: Boston ; London : Artech House, cop. 2002Availability: Items available for loan: (1).
Practical UNIX and Internet security-(EBOOK) Simson Garfinkel, Gene Spafford and Alan Schwartz.

by Garfinkel, Simson | Schwartz, Alan | Spafford, Gene.

Edition: 3. ed. Publisher: Beijing : O'Reilly, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 GAR (1).
Beginning cryptography with Java / David Hook.

by Hook, David.

Publisher: Indianapolis, IN : Wiley Pub., 2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 HOO (1).
Introduction to cryptography with Java applets(E-BOOK) David Bishop.

by Bishop, David.

Publisher: Boston : Jones and Bartlett, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BIS (1).
Applied cryptography -(E-BOOK) Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82 SCH (1).
Security warrior-(EBOOK) [know your enemy] / Cyrus Peikari and Anton Chuvakin

by Peikari, Cyrus | Chuvakin, Anton.

Edition: 1. ed. Publisher: Beijing ; Cambridge : O'Reilly, 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PEI (1).
Hack attacks revealed (E-BOOK) a complete reference with custom security hacking toolkit / John Chirillo.

by Chirillo, John.

Publisher: New York : Wiley, 2001Online access: Contributor biographical information | Publisher description | Table of Contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 JOH (1).
Malware: fighting malicious code - (E-BOOK) Ed Skoudis with Lenny Zeltser

by Skoudis, Ed | Zeltser, Lenny.

Publisher: Upper Saddle River, N.J. ; London : Prentice Hall PTR, cop. 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SKO (1).
Java 2 network security /(E-BOOK) Marco Pistoia ... [et al.].

by Pistoia, Marco.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PIS (1).
Java 2 network security -(E-BOOK) Marco Pistoia ... [et al.].

by Pistoia, Marco | Pistoia, Marco.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8.PIS (1).
Enterprise security-(E-BOOK) the manager's defense guide / David Leon Clark.

by Clark, David Leon.

Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 CLA (1).
Developing secure distributed applications with CORBA(E-BOOK) Ulrich Lang, Rudolf Schreiner

by Lang, Ulrich | Schreiner, Rudolf.

Publisher: Boston ; London : Artech House, cop. 2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 LAN (1).
Have you locked the castle gate-(E-BOOK) home and small- business computer security / Brian Shea.

by Shea, Brian.

Publisher: Boston : Addison-Wesley, 2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHE (1).
Hackers beware -(E-BOOK) Eric Cole.

by Cole, Eric.

Edition: 1st ed. Publisher: Indianapolis, Ind. : New Riders, c2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 COL (1).
Incident response :computer forensics toolkit -(E-BOOK) Douglas Schweitzer.

by Schweitzer, Douglas.

Publisher: Indianapolis, IN : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.256 SCH (1).
Role-based access control (E-BOOK) David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

by Ferraiolo, David | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Publisher: Boston : Artech House, c2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 DAV (1).
Introduction to cryptography with Java applets -(E-BOOK) David Bishop.

by Bishop, David.

Publisher: Boston : Jones and Bartlett, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BIS (1).
Red Hat Linux security and optimization(E-BOOK) Mohammed J. Kabir

by Kabir, Mohammed J.

Publisher: New York : Hungry Minds, cop. 2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KAB (1).
Building a secure computer system (E-BOOK) Morrie Gasser.

by Gasser, Morrie.

Publisher: New York : Van Nostrand Reinhold Co., c1988Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 GAS (1).
Computer security handbook.(E-BOOK)

by Bosworth, Seymour | Kabay, Michel E | Whyne, Eric, 1981-.

Edition: 5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne. Publisher: Hoboken, N.J. : John Wiley & Sons, c2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 BOS (1).
An Introduction to Computer Security The NIST Handbook (E-BOOK) Special Publication 800-12

by Lascu, Octavian | International Business Machines Corporation. International Technical Support Organization.

Edition: 1st ed. Publisher: [S.l.] : IBM International Technical Support Organization, 2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 651 NIS (1).
Secure programming cookbook(E-BOOK) for C and C++ / John Viega, Matt Messier

by Viega, John | Messier, Matt.

Publisher: Beijing : O'Reilly , 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82 VIE (1).
Hacking for dummies(E-BOOK) Kevin Beaver.

by Beaver, Kevin.

Publisher: New York : Chichester : Hungry Minds ; John Wiley, 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BEA (1).
Hacker disassembling uncovered(E-BOOK) [powerful techniques to safeguard your programming] / Kris Kaspersky

by Kaspersky, Kris.

Publisher: Wayne, Pa. : Alist, cop. 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KAS (1).
Hacking(E-BOOK) the art of exploitation / by Jon Erickson.

by Erickson, Jon.

Publisher: San Francisco : No Starch Press, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ERI (1).
Web security portable reference(E-BOOK) Mike Shema

by Shema, Mike.

Publisher: New York : McGraw-Hill/Osborne, cop. 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHE (1).
The art of deception(E-BOOK) controlling the human element of security / Kevin D. Mitnick and William L. Simon ; foreword by Steve Wozniak.

by Mitnick, Kevin D | Simon, William L, 1930-.

Publisher: Indianapolis, Ind. : Wiley, c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MIT (1).
The art of intrusion(E-BOOK) the real stories behind the exploits of hackers, intruders, & deceivers / Kevin D. Mitnick, William L. Simon.

by Mitnick, Kevin D | Simon, William L, 1930-.

Publisher: Indianapolis, IN : Wiley, c2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MIT (1).
Computer privacy annoyances(E-BOOK) how to avoid the most annoying invasions of your personal and online privacy / Dan Tyan.

by Tynan, Dan.

Edition: 1st ed. Publisher: Sebastopol, CA ; Farnham : O'Reilly Media, c2005Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TYA (1).
1337 h4x0r h4ndb00k(E-BOOK) Tapeworm.

by Tapeworm.

Publisher: Indianapolis, Ind. : Sams Publishing, c2005Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TAP (1).
Information security :design, implementation, measurement, and compliance -(E-BOOK) Timothy P. Layton.

by Layton, Timothy P.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 LAY (1).
Investigator's guide to steganography(E-BOOK) Gregory Kipper.

by Kipper, Gregory.

Publisher: Boca Raton, FL : Auerbach Publications, c2004Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8/2 KIP (1).
Applications of data mining in computer security (E-BOOK) edited by Daniel Barbar?a, Sushil Jajodia.

by Barbara, Daniel | Jajodia, Sushil.

Publisher: Boston : Kluwer Academic Publishers, c2002Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 006.3 SHO (1).
Distributed systems security issues, processes, and solutions (E-Book) Abhijit Belapurkar .

by Abhijit Belapurkar | Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley & Sons, 2009Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BEL (1).
Hardening network security / John Mallery ... [et al.].

by Mallery, John | Mallery, John.

Publisher: Emeryville, Calif. : McGraw-Hill/Osborne, 2005Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MAL (1).
Security in computing / Charles P. Pfleeger

by Pfleeger, Charles P.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, cop. 1997Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PFL (1).
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer.

by Bauer, Friedrich Ludwig.

Edition: 3rd, rev. and updated ed. Publisher: Berlin ; New York : Springer, c2002Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,BAU (1).
Introduction to cryptography with Java applets / David Bishop.

by Bishop, David.

Publisher: Boston : Jones and Bartlett, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BIS (1).
Modern Cryptography ; theory and practice / Wenbo Mao

by Mao, Wenbo | Hewlett-Packard.

Publisher: Upper Saddle River, NJ : Prentice Hall, cop 2004Availability: No items available : Checked out (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.