Limit search to available items
Nearby Call Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Medium Year
005.82 Pan/Iho : Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)     
      Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.) W'PONDS  Book 2009
005.82 Pre/Sai 2005 : Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)     
      Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.) W'PONDS  Book 2006
005.82 Rao/Iha : The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak     
      The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak MELB  Book 2014
005.82 Ros/Iec    
      Implementing elliptic curve cryptography / Michael Rosing MELB, W'PONDS   Book 1999
      Implementing elliptic curve cryptography / Michael Rosing MELB, W'PONDS   Book 1999
005.82 Saf/Mha : MRD hashing / R. Safavi-Naini and C. Charnes     
      MRD hashing / R. Safavi-Naini and C. Charnes W'PONDS, WATERFT ADPML   Book 2005
005.82 Sal/Pkc : Public-key cryptography / Arto Salomaa     
      Public-key cryptography / Arto Salomaa W'PONDS  Book 1990
005.82 Sal/Pkc 1996 : Public-key cryptography / Arto Salomaa     
      Public-key cryptography / Arto Salomaa W'PONDS  Book 1996
005.82 San/Vsp : VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz     
      VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz W'PONDS  Book 1991
005.82 Sch/Acp : Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier     
      Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier W'PONDS  Book 1994
005.82 Seb/Cai : Cryptography : an introduction / Nigel Smart     
      Cryptography : an introduction / Nigel Smart MELB  Book 2003
005.82 Sen/Dhf : Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu     
      Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu W'PONDS  Book 2004
005.82 Shi/Tod : Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)     
      Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.) MELB  Book 2006
005.82 Sim/Cct : Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons     
      Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons W'PONDS  Book 1992
005.82 Sta/Can 2011    
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
      Cryptography and network security : principles and practice / William Stallings MELB, W'PONDS   Book 2011
005.82 Sta/Can 2017 : Cryptography and network security : principles and practice / William Stallings     
      Cryptography and network security : principles and practice / William Stallings MELB  Book 2017
005.82 Sta/Icw    
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
      Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch MELB, W'PONDS   Book 2011
005.82 Sti/Cta 2006    
      Cryptography : theory and practice / Douglas R. Stinson MELB, W'PONDS   Book 2006
      Cryptography : theory and practice / Douglas R. Stinson MELB, W'PONDS   Book 2006
005.82 Tra/Itc 2006    
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
      Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington MELB, W'PONDS   Book 2005
3 additional entries    
005.82 Tuy/Swn : Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar     
      Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar W'PONDS  Book 2007
005.82 Vie/Nsw : Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra     
      Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra MELB  Book 2002
005.82 Yan/Cao : Cryptanalytic attacks on RSA / Song Y. Yan     
      Cryptanalytic attacks on RSA / Song Y. Yan W'PONDS  Book 2007
005.82 Yan/Pta 2009    
      Primality testing and integer factorization in public-key cryptography / by Song Y. Yan MELB, W'PONDS   Book 2009
      Primality testing and integer factorization in public-key cryptography / by Song Y. Yan MELB, W'PONDS   Book 2009
005.82 You/Mce : Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung     
      Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung W'PONDS  Book 2004
005.82 Zon/Rdi : Robust digital image watermarking / by Tianrui Zong     
      Robust digital image watermarking / by Tianrui Zong MELB THESES  CD-ROM 2015
005.8201512 Kob/Aao : Algebraic aspects of cryptography / Neal Koblitz     
      Algebraic aspects of cryptography / Neal Koblitz MELB  Book 1998
005.824 Dor/Bfc : Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak     
      Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak MELB  Book 2020
005.84 Ala/Aos : Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab     
      Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab MELB THESES  CD-ROM 2014
005.84 Erb/Twa : Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe     
      Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe MELB  Book 2005
005.84 Fil/Cuf : Computer viruses : from theory to applications / Eric Filiol     
      Computer viruses : from theory to applications / Eric Filiol MELB  Book 2005
005.84 Gri/Mmc : Malicious mobile code : virus protection for Windows / Roger A. Grimes     
      Malicious mobile code : virus protection for Windows / Roger A. Grimes W'PONDS  Book 2001
005.84 Par/Dca : Digital contagions : a media archaeology of computer viruses / Jussi Parikka     
      Digital contagions : a media archaeology of computer viruses / Jussi Parikka WATERFT  Book 2007
005.84 Par/Dca 2016 : Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka     
      Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka MELB  CD-ROM 2016
005.84 Sin/Imc : Identifying malicious code through reverse engineering / edited by Abhishek Singh     
      Identifying malicious code through reverse engineering / edited by Abhishek Singh MELB  Book 2009
005.84 Xia/Soa : A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury     
      A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury WATERFT ADPML  Book 2004
005.86 Deg/Esb : Enterprise systems backup and recovery : a corporate insurance policy / Preston de Guise     
      Enterprise systems backup and recovery : a corporate insurance policy / Preston de Guise MELB  Book 2008
005.86 Liu/Tra : Trusted recovery and defensive information warfare / by Peng Liu, Sushil Jajodia     
      Trusted recovery and defensive information warfare / by Peng Liu, Sushil Jajodia W'PONDS  Book 2002
005.86 Mal/Ldo    
      Logical design of the recovery facility / by Andrew Maloney MELB, WATERFT ADPML   Kit 2005
      Logical design of the recovery facility / by Andrew Maloney MELB, WATERFT ADPML   Kit 2005
005.86 Unix Pre/Uba : Unix backup and recovery / W. Curtis Preston     
      Unix backup and recovery / W. Curtis Preston W'PONDS  Book 1999
006 Auk/Smt : Silicon mirage : the art and science of virtual reality / by Steve Aukstakalnis and David Blatner ; edited by Stephen F. Roth     
      Silicon mirage : the art and science of virtual reality / by Steve Aukstakalnis and David Blatner ; edited by Stephen F. Roth W'PONDS  Book 1992
006 Cam/Gbc : Gesture-based communication in human-computer interaction : 5th International Gesture Workshop, GW 2003 : Genova, Italy, April 15-17, 2003 : selected revised papers / Antonio Camurri, Gualtiero Volpe (eds.)     
      Gesture-based communication in human-computer interaction : 5th International Gesture Workshop, GW 2003 : Genova, Italy, April 15-17, 2003 : selected revised papers / Antonio Camurri, Gualtiero Volpe ( W'PONDS  Book 2004
006 Cli : An introduction to automated data acquisition / Ben E. Cline     
      An introduction to automated data acquisition / Ben E. Cline W'PONDS  Book 1983
006 Coh/Iat : It's alive! : the new breed of living computer programs / Frederick B. Cohen     
      It's alive! : the new breed of living computer programs / Frederick B. Cohen W'PONDS  Book 1994
006 Den/Ral : Reading and learning : adaptive content recognition / Andreas Dengel, Markus Junker, Anette Weisbecker (eds.)     
      Reading and learning : adaptive content recognition / Andreas Dengel, Markus Junker, Anette Weisbecker (eds.) W'PONDS  Book 2004
006 Dre/Sca : Smart cards : a guide to building and managing smart card applications / Henry Dreifus, J. Thomas Monk     
      Smart cards : a guide to building and managing smart card applications / Henry Dreifus, J. Thomas Monk W'PONDS  Book 1998
006 Ges/Wor 2005 : Gesture in human-computer interaction and simulation : 6th International Gesture Workshop, GW 2005, Berder Island, France, May 18-20, 2005 : revised selected papers / Sylvie Gibet, Nicolas Courty, Jean-Francois Kamp (eds.)     
      Gesture in human-computer interaction and simulation : 6th International Gesture Workshop, GW 2005, Berder Island, France, May 18-20, 2005 : revised selected papers / Sylvie Gibet, Nicolas Courty, Jean MELB  Book 2006
006 Hei/Mov : The metaphysics of virtual reality / Michael Heim     
      The metaphysics of virtual reality / Michael Heim W'PONDS  Book 1993
006 Hem/Fip : From integrated publication and information systems to virtual information and knowledge environments : essays dedicated to Erich J. Neuhold on the occasion of his 65th birthday / Matthias Hemmje, Claudia Niederee, Thomas Risse (eds.)     
      From integrated publication and information systems to virtual information and knowledge environments : essays dedicated to Erich J. Neuhold on the occasion of his 65th birthday / Matthias Hemmje, Clau W'PONDS  Book 2005
006 Int/Ipo 1995 : ICAUTO-95 : proceedings of the International Conference on Automation, Dec. 12-14, 1995 / editors, Pradip K. Chande ... [and others]     
      ICAUTO-95 : proceedings of the International Conference on Automation, Dec. 12-14, 1995 / editors, Pradip K. Chande ... [and others] W'PONDS  Book 1995
006 Itw/Cod 2006    
      Human work interaction design : designing for human work : the first IFIP TC 13.6 WG conference : designing for human work, February 13-15, 2006, Madeira, Portugal / edited by Torkil Clemmensen ... [an W'PONDS  Book 2006
      Human work interaction design : designing for human work : the first IFIP TC 13.6 WG conference : designing for human work, February 13-15, 2006, Madeira, Portugal / edited by Torkil Clemmensen ... [an W'PONDS  Book 2006
006 Joo/Fri : Frame rate improvement for the VFX1 headset in virtual reality applications / by Matthew A. Joordens     
      Frame rate improvement for the VFX1 headset in virtual reality applications / by Matthew A. Joordens W'PONDS THESES  Book 1998
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next