This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Titles (1-21 of 21)
Artech House information security and privacy series.
1
2018
Attribute-Based Access Control
Hu, Vincent
Rating:
Electronic Resources
More...
2
2011
Biometrics in Identity Management : Concepts to Applications
Modi, Shimon K
Rating:
Electronic Resources
3
2016
Bitcoin and blockchain security
Karame, Ghassan, author
Norwood, MA : Artech House, [2016]
Rating:
Electronic Resources
4
2020
Blockchain for Cyberphysical Systems
Dorri, Ali author
Norwood, MA Artech House [2020]
Rating:
Electronic Resources
More...
5
2011
Contemporary Cryptography
Oppliger, Rolf
2nd ed
Rating:
Electronic Resources
6
2020
End-to-end encrypted messaging
Oppliger, Rolf, author.
Norwood, MA Artech House [2020]
Rating:
Electronic Resources
More...
7
2009
Enterprise information security and privacy
Rating:
Electronic Resources
More...
8
2018
Fuzzing for software security testing and quality assurance
Second edition
Boston, MA : Artech House, [2018]
Rating:
Electronic Resources
9
2008
Fuzzing for software security testing and quality assurance
Takanen, Ari.
Rating:
Electronic Resources
10
2010
Identity Management : concepts, technologies, and systems
Bertino, Elisa.
Rating:
Electronic Resources
11
2007
Implementing the ISO/IEC 27001 information security management system standard
Humphreys, Ted, author
Boston : Artech House, [2007]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.80218 Hum/Iti
AVAILABLE
12
2016
Implementing the ISO/IEC 27001 ISMS standard
Humphreys, Ted, author.
Second edition
Boston : Artech House, [2016]
Rating:
Electronic Resources
13
2008
Introduction to identity-based encryption
Martin, Luther.
Boston : Artech House, [2008]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.82 Mar/Iti
AVAILABLE
14
2008
Introduction to identity-based encryption
Martin, Luther.
Rating:
Electronic Resources
More...
15
2020
Medical device cybersecurity for engineers and manufacturers
Wirth, Axel (Security strategist), author.
Norwood, MA Artech House [2020]
Rating:
Electronic Resources
More...
16
2019
The penetration tester's guide to web applications
Borso, Serge, author.
Norwood, MA : Artech House, [2019]
Rating:
Electronic Resources
More...
17
2007
Role-based access control
Ferraiolo, David.
2nd ed
Rating:
Electronic Resources
18
2008
Role engineering for enterprise security management
Coyne, Edward J., PhD.
Rating:
Electronic Resources
More...
19
2008
Securing information and communications systems : principles, technologies, and applications
Boston ; London : Artech House, [2008]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 Fur/Sia
AVAILABLE
20
2008
Securing information and communications systems : principles, technologies, and applications
Rating:
Electronic Resources
More...
21
2009
SSL and TLS : theory and practice
Oppliger, Rolf.
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search