Limit search to available items
Save marked records Save all on page
SUBJECTS (1-38 of 38)
Data Encryption Computer Science
1
Mark
  Advances in Cryptology - ASIACRYPT 2011 : 17th International Conference on the Theory and Applicatio
Lee, Dong Hoon.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
2
Mark
  Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Or
Peterson, Gilbert.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011. -Access this resource online
2011
EBOOKS
3
Mark
  Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan
Iwata, Tetsu.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
4
Mark
  Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, Indi
CNSA (Conference) (2011 : Chennai, India), creator
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
5
Mark
  Applied information security a hands-on approach
Basin, David.
Heidelberg ; New York : Springer, c2011. -Access this resource online
c2011
EBOOKS
6
Mark
  Autonomic and Trusted Computing : 8th International Conference, ATC 2011, Banff, Canada, September 2
Calero, Jose M. Alcaraz.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
7
Mark
  The code book : the secret history of codes and code-breaking.
Singh, Simon.
London : Fourth Estate, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 S6  8 WEEK LOAN  AVAILABLE
8
Mark
  Critical infrastructure protection V 5th IFIP WG 11.10 International Conference on Critical Infrastr
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (5th : 2011 : Hanover, N.H.)
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
9
Mark
  The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K8  8 WEEK LOAN  AVAILABLE
10
Mark
  Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15,
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
11
Mark
  Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 S7  8 WEEK LOAN  AVAILABLE
12
Mark
  Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 1
Lin, Dongdai.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
13
Mark
  Digital cash : commerce on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HG 1710 W3  8 WEEK LOAN  AVAILABLE
14
Mark
  Electronic payment systems for e-commerce
O'Mahony, Donal, 1961-
Boston : Artech House, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HG 1710 O5  8 WEEK LOAN  AVAILABLE
15
Mark
  Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Neth
Barthe, Gilles.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. -Access this resource online
2012
EBOOKS
16
Mark
  Expert Oracle and Java security programming secure Oracle database applications with Java
Coffin, David.
[New York] : Apress, c2011. -Access this resource online
c2011
EBOOKS
17
Mark
  Identity-based encryption
Chatterjee, Sanjit.
New York : Springer, c2011. -Access this resource online
c2011
EBOOKS
18
Mark
  Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China,
Qing, Sihan.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
19
Mark
  Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. P
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
20
Mark
  Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August
Kim, Tai-hoon.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
21
Mark
  Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China,
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011. -Access this resource online
2011
EBOOKS
22
Mark
  Introduction to cryptography with mathematical foundations and computer implementations
Stanoyevitch, Alexander.
Boca Raton, Fla. : Chapman & Hall/CRC, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 S7  8 WEEK LOAN  AVAILABLE
23
Mark
  NETWORKING 2011 Workshops : International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011
Casares-Giner, Vicente.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
24
Mark
  Physically unclonable functions (PUFs) : applications, models, and future directions
Wachsmann, Christian.
San Rafael, California : Morgan & Claypool Publishers, [2015] -Access this resource online
2015
EBOOKS
25
Mark
  Post-Quantum Cryptography : 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 ?

Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
26
Mark
  Privacy Enhancing Technologies : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July
Fischer-Hübner, Simone.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
27
Mark
  Security of block ciphers : from algorithm design to hardware implementation
Sakiyama, Kazuo, 1971-
Singapore : Wiley, [2015] -Access this resource online
2015
EBOOKS
28
Mark
  Security Protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Sele
Christianson, Bruce.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
29
Mark
  Security Technology International Conference SecTech 2011, Held as Part of the Future Generation Inf
SecTech (Conference) (2011 : Cheju Island, Korea), creator
Heidelberg : Springer, [2011] -Access this resource online
2011
EBOOKS
30
Mark
  Selected Areas in Cryptography : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, A
Biryukov, Alex.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
31
Mark
  Smart Card Research and Advanced Applications : 10th IFIP WG 8.8/11.2 International Conference, CARD
Prouff, Emmanuel.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
32
Mark
  SSH, the secure shell : the definitive guide.
Barrett, D. J.
Sebastopol : O'Reilly, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BAR  4 WEEK LOAN  AVAILABLE
33
Mark
  Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 2
Theory of Cryptography Conference (8th : 2011 : Providence, R.I.) author
Heidelberg: Springer, [2011] -Access this resource online
2011
EBOOKS
34
Mark
  Transactions on Data Hiding and Multimedia Security VI
Shi, Yun Q.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
35
Mark
  Trust Management V 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, Jun
Wakeman, Ian.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. -Access this resource online
2011
EBOOKS
36
Mark
  Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 201
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011. -Access this resource online
2011
EBOOKS
37
Mark
  Writing secure code
Howard, Michael, 1965-
Redmond, Wash. : Microsoft Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H8  8 WEEK LOAN  AVAILABLE
Click to view copies/volumes at all libraries
38
Mark
  Writing secure code practical strategies and proven techniques for building secure applications in a
Howard, Michael, 1965-
Redmond, Wash. : Microsoft, c2003. -Access this resource online
c2003
EBOOKS
Save marked records Save all on page
Locate in results