005.82 Nar/Woe 2008 : Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others]
Enhancing cryptographic primitives with techniques from error correcting codes / edited by Bart Preneel ... [and others]
MELB
2009
005.82 Ned/Eca : Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle
Embedded cryptographic hardware : design & security / edited by Nadia Nedjah, Luiza de Macedo Mourelle
W'PONDS
2005
005.82 Ned/Ech : Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors)
Embedded cryptographic hardware : methodologies & architectures / Nadia Nedjah and Luiza de Macedo Mourelle (editors)
W'PONDS
2004
005.82 Ned/Nti : New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors
New trends in cryptographic systems / Nadia Nedjah and Luiza de Macedo Mourelle, editors
W'PONDS
2006
005.82 Paa/Uca
Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl
MELB, W'PONDS
2010
Understanding cryptography : a textbook for students and practitioners / by Christof Paar, Jan Pelzl
MELB, W'PONDS
2010
005.82 Pan/Iho : Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)
Information hiding and applications / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (Eds.)
W'PONDS
2009
005.82 Pre/Sai 2005 : Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)
Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / Bart Preneel, Stafford Tavares (eds.)
W'PONDS
2006
005.82 Rao/Iha : The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak
The InfoSec handbook : an introduction to information security / Umesh Hodeghatta Rao, Umesha Nayak
MELB
2014
005.82 Ros/Iec
Implementing elliptic curve cryptography / Michael Rosing
MELB, W'PONDS
1999
Implementing elliptic curve cryptography / Michael Rosing
MELB, W'PONDS
1999
005.82 Saf/Mha : MRD hashing / R. Safavi-Naini and C. Charnes
MRD hashing / R. Safavi-Naini and C. Charnes
WATERFT ADPML
2005
005.82 Sal/Pkc : Public-key cryptography / Arto Salomaa
Public-key cryptography / Arto Salomaa
W'PONDS
1990
005.82 Sal/Pkc 1996 : Public-key cryptography / Arto Salomaa
Public-key cryptography / Arto Salomaa
W'PONDS
1996
005.82 San/Vsp : VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz
VAX security : protecting the system and the data / Corey Sandler, Tom Badgett, Larry Lefkowitz
W'PONDS
1991
005.82 Sch/Acp : Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier
W'PONDS
1994
005.82 Seb/Cai : Cryptography : an introduction / Nigel Smart
Cryptography : an introduction / Nigel Smart
MELB
2003
005.82 Sen/Dhf : Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
Data hiding fundamentals and applications / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
W'PONDS
2004
005.82 Shi/Tod : Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)
Transactions on data hiding and multimedia security. 1 / Yun Q. Shi (Ed.)
MELB
2006
005.82 Sim/Cct : Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons
Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons
W'PONDS
1992
005.82 Sta/Can 2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
Cryptography and network security : principles and practice / William Stallings
MELB, W'PONDS
2011
005.82 Sta/Icw
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
Introduction to cryptography with mathematical foundations and computer implementations / Alexander Stanoyevitch
MELB, W'PONDS
2011
005.82 Sti/Cta 2006
Cryptography : theory and practice / Douglas R. Stinson
MELB, W'PONDS
2006
Cryptography : theory and practice / Douglas R. Stinson
MELB, W'PONDS
2006
005.82 Tra/Itc 2006
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
Introduction to cryptography : with coding theory / Wade Trappe, Lawrence C. Washington
MELB, W'PONDS
2005
3 additional entries
005.82 Tuy/Swn : Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting / edited by Pim Tuyls, Boris Skoric and Tom Kevenaar
W'PONDS
2007
005.82 Vie/Nsw : Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra
Network security with OpenSSL / John Viega, Matt Messier, and Pravir Chandra
MELB
2002
005.82 Yan/Cao : Cryptanalytic attacks on RSA / Song Y. Yan
Cryptanalytic attacks on RSA / Song Y. Yan
W'PONDS
2007
005.82 Yan/Pta 2009
Primality testing and integer factorization in public-key cryptography / by Song Y. Yan
MELB, W'PONDS
2009
Primality testing and integer factorization in public-key cryptography / by Song Y. Yan
MELB, W'PONDS
2009
005.82 You/Mce : Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung
Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung
W'PONDS
2004
005.82 Zon/Rdi : Robust digital image watermarking / by Tianrui Zong
Robust digital image watermarking / by Tianrui Zong
MELB THESES
2015
005.8201512 Kob/Aao : Algebraic aspects of cryptography / Neal Koblitz
Algebraic aspects of cryptography / Neal Koblitz
MELB
1998
005.824 Dor/Bfc : Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak
Blockchain for Cyberphysical Systems / Ali Dorri, Salil Kanhere, Raja Jurdak
MELB
2020
005.84 Ala/Aos : Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab
Analysis on smartphone devices for detection and prevention of malware / by Moutaz Atef Alazab
MELB THESES
2014
005.84 Erb/Twa : Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe
MELB
2005
005.84 Fil/Cuf : Computer viruses : from theory to applications / Eric Filiol
Computer viruses : from theory to applications / Eric Filiol
MELB
2005
005.84 Gri/Mmc : Malicious mobile code : virus protection for Windows / Roger A. Grimes
Malicious mobile code : virus protection for Windows / Roger A. Grimes
W'PONDS
2001
005.84 Mon/Lma : Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware / Monnappa K A
MELB
2018
005.84 Par/Dca : Digital contagions : a media archaeology of computer viruses / Jussi Parikka
Digital contagions : a media archaeology of computer viruses / Jussi Parikka
WATERFT
2007
005.84 Par/Dca 2016 : Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka
Digital Contagions : A Media Archaeology of Computer Viruses / Jussi Parikka
MELB
2016
005.84 Sik/Pma : Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig
MELB
c2012
005.84 Sin/Imc : Identifying malicious code through reverse engineering / edited by Abhishek Singh
Identifying malicious code through reverse engineering / edited by Abhishek Singh
MELB
2009
005.84 Xia/Soa : A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury
A survey of active and passive defence mechanisms against DDoS attacks / Yang Xiang, Wanlei Zhou and Morshed Chowdhury
WATERFT ADPML
2004
005.86 Deg/Esb : Enterprise systems backup and recovery : a corporate insurance policy / Preston de Guise
Enterprise systems backup and recovery : a corporate insurance policy / Preston de Guise
MELB
2008
005.86 Liu/Tra : Trusted recovery and defensive information warfare / by Peng Liu, Sushil Jajodia
Trusted recovery and defensive information warfare / by Peng Liu, Sushil Jajodia
W'PONDS
2002
005.86 Mal/Ldo : Logical design of the recovery facility / by Andrew Maloney
Logical design of the recovery facility / by Andrew Maloney
WATERFT ADPML
2005
005.86 Unix Pre/Uba : Unix backup and recovery / W. Curtis Preston
Unix backup and recovery / W. Curtis Preston
W'PONDS
1999
005.88 Kle/Mma : Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacks / Alexey Kleymenov, Amr Thabet
Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacks / Alexey Kleymenov, Amr Thabet
MELB
2019
006 Auk/Smt : Silicon mirage : the art and science of virtual reality / by Steve Aukstakalnis and David Blatner ; edited by Stephen F. Roth
Silicon mirage : the art and science of virtual reality / by Steve Aukstakalnis and David Blatner ; edited by Stephen F. Roth
W'PONDS
1992
006 Cam/Gbc : Gesture-based communication in human-computer interaction : 5th International Gesture Workshop, GW 2003 : Genova, Italy, April 15-17, 2003 : selected revised papers / Antonio Camurri, Gualtiero Volpe (eds.)
Gesture-based communication in human-computer interaction : 5th International Gesture Workshop, GW 2003 : Genova, Italy, April 15-17, 2003 : selected revised papers / Antonio Camurri, Gualtiero Volpe (
W'PONDS
2004
006 Cli : An introduction to automated data acquisition / Ben E. Cline
An introduction to automated data acquisition / Ben E. Cline
W'PONDS
1983
006 Coh/Iat : It's alive! : the new breed of living computer programs / Frederick B. Cohen
It's alive! : the new breed of living computer programs / Frederick B. Cohen
W'PONDS
1994
006 Den/Ral : Reading and learning : adaptive content recognition / Andreas Dengel, Markus Junker, Anette Weisbecker (eds.)
Reading and learning : adaptive content recognition / Andreas Dengel, Markus Junker, Anette Weisbecker (eds.)
W'PONDS
2004
Add Marked to Bag
Add All On Page
Add Marked to My Lists