Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
005.82 Pan/Iho : Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)  2009 1
005.82 Pre/Sai 2005 : Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)  2006 1
005.82 Rao/Iha : The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak  2014 1
005.82 Ros/Iec   2
005.82 Saf/Mha : MRD hashing / R. Safavi-Naini and C. Charnes  2005 1
005.82 Sal/Pkc : Public-key cryptography / Arto Salomaa  1990 1
005.82 Sal/Pkc 1996 : Public-key cryptography / Arto Salomaa  1996 1
005.82 San/Vsp : VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz  1991 1
005.82 Sch/Acp : Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier  1994 1
005.82 Seb/Cai : Cryptography : an introduction / Nigel Smart  2003 1
005.82 Sen/Dhf : Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu  2004 1
005.82 Shi/Tod : Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)  2006 1
005.82 Sim/Cct : Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons  1992 1
005.82 Sta/Can 2011   4
005.82 Sta/Icw   5
005.82 Sti/Cta 2006   2
005.82 Tra/Itc 2006   7
005.82 Tuy/Swn : Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar  2007 1
005.82 Vie/Nsw : Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra  2002 1
005.82 Yan/Cao : Cryptanalytic attacks on RSA / Song Y. Yan  2007 1
005.82 Yan/Pta 2009   2
005.82 You/Mce : Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung  2004 1
005.82 Zon/Rdi : Robust digital image watermarking / by Tianrui Zong  2015 1
005.8201512 Kob/Aao : Algebraic aspects of cryptography / Neal Koblitz  1998 1
005.824 Dor/Bfc : Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak  2020 1
005.84 Ala/Aos : Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab  2014 1
005.84 Erb/Twa : Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe  2005 1
005.84 Fil/Cuf : Computer viruses : from theory to applications / Eric Filiol  2005 1
005.84 Gri/Mmc : Malicious mobile code : virus protection for Windows / Roger A. Grimes  2001 1
005.84 Mon/Lma : Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A  2018 1
005.84 Par/Dca : Digital contagions : a media archaeology of computer viruses / Jussi Parikka  2007 1
005.84 Par/Dca 2016 : Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka  2016 1
005.84 Sik/Pma : Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig  c2012 1
005.84 Sin/Imc : Identifying malicious code through reverse engineering / edited by Abhishek Singh  2009 1
005.84 Xia/Soa : A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury  2004 1
005.86 Deg/Esb : Enterprise systems backup and recovery : a corporate insurance policy / Preston de Guise  2008 1
005.86 Liu/Tra : Trusted recovery and defensive information warfare / by Peng Liu, Sushil Jajodia  2002 1
005.86 Mal/Ldo : Logical design of the recovery facility / by Andrew Maloney  2005 1
005.86 Unix Pre/Uba : Unix backup and recovery / W. Curtis Preston  1999 1
005.88 Kle/Mma : Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacks / Alexey Kleymenov, Amr Thabet  2019 1
006 Auk/Smt : Silicon mirage : the art and science of virtual reality / by Steve Aukstakalnis and David Blatner ; edited by Stephen F. Roth  1992 1
006 Cam/Gbc : Gesture-based communication in human-computer interaction : 5th International Gesture Workshop, GW 2003 : Genova, Italy, April 15-17, 2003 : selected revised papers / Antonio Camurri, Gualtiero Volpe (eds.)  2004 1
006 Cli : An introduction to automated data acquisition / Ben E. Cline  1983 1
006 Coh/Iat : It's alive! : the new breed of living computer programs / Frederick B. Cohen  1994 1
006 Den/Ral : Reading and learning : adaptive content recognition / Andreas Dengel, Markus Junker, Anette Weisbecker (eds.)  2004 1
006 Dre/Sca : Smart cards : a guide to building and managing smart card applications / Henry Dreifus, J. Thomas Monk  1998 1
006 Ges/Wor 2005 : Gesture in human-computer interaction and simulation : 6th International Gesture Workshop, GW 2005, Berder Island, France, May 18-20, 2005 : revised selected papers / Sylvie Gibet, Nicolas Courty, Jean-Francois Kamp (eds.)  2006 1
006 Hei/Mov : The metaphysics of virtual reality / Michael Heim  1993 1
006 Hem/Fip : From integrated publication and information systems to virtual information and knowledge environments : essays dedicated to Erich J. Neuhold on the occasion of his 65th birthday / Matthias Hemmje, Claudia Niederee, Thomas Risse (eds.)  2005 1
006 Int/Ipo 1995 : ICAUTO-95 : proceedings of the International Conference on Automation, Dec. 12-14, 1995 / editors, Pradip K. Chande ... [and others]  1995 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next