Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
SUBJECTS (1-38 of 38)
Data Encryption Computer Science
1
Mark
Advances in Cryptology - ASIACRYPT 2011 : 17th International Conference on the Theory and Applicatio
Lee, Dong Hoon.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
2
Mark
Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Or
Peterson, Gilbert.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Access this resource online
2011
EBOOKS
3
Mark
Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan
Iwata, Tetsu.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
4
Mark
Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, Indi
CNSA (Conference) (2011 : Chennai, India), creator
Heidelberg : Springer, [2011]
Access this resource online
2011
EBOOKS
5
Mark
Applied information security a hands-on approach
Basin, David.
Heidelberg ; New York : Springer, c2011.
Access this resource online
c2011
EBOOKS
6
Mark
Autonomic and Trusted Computing : 8th International Conference, ATC 2011, Banff, Canada, September 2
Calero, Jose M. Alcaraz.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
7
Mark
The code book : the secret history of codes and code-breaking.
Singh, Simon.
London : Fourth Estate, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 S6
8 WEEK LOAN
AVAILABLE
8
Mark
Critical infrastructure protection V 5th IFIP WG 11.10 International Conference on Critical Infrastr
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (5th : 2011 : Hanover, N.H.)
Heidelberg : Springer, [2011]
Access this resource online
2011
EBOOKS
9
Mark
The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.
1999
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 K8
8 WEEK LOAN
AVAILABLE
10
Mark
Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15,
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
11
Mark
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.
c2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 S7
8 WEEK LOAN
AVAILABLE
12
Mark
Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 1
Lin, Dongdai.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
13
Mark
Digital cash : commerce on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
HG 1710 W3
8 WEEK LOAN
AVAILABLE
14
Mark
Electronic payment systems for e-commerce
O'Mahony, Donal, 1961-
Boston : Artech House, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
HG 1710 O5
8 WEEK LOAN
AVAILABLE
15
Mark
Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Neth
Barthe, Gilles.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Access this resource online
2012
EBOOKS
16
Mark
Expert Oracle and Java security programming secure Oracle database applications with Java
Coffin, David.
[New York] : Apress, c2011.
Access this resource online
c2011
EBOOKS
17
Mark
Identity-based encryption
Chatterjee, Sanjit.
New York : Springer, c2011.
Access this resource online
c2011
EBOOKS
18
Mark
Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China,
Qing, Sihan.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
19
Mark
Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. P
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
20
Mark
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August
Kim, Tai-hoon.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
21
Mark
Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China,
Lai, Xuejia.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Access this resource online
2011
EBOOKS
22
Mark
Introduction to cryptography with mathematical foundations and computer implementations
Stanoyevitch, Alexander.
Boca Raton, Fla. : Chapman & Hall/CRC, 2013.
2013
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 S7
8 WEEK LOAN
AVAILABLE
23
Mark
NETWORKING 2011 Workshops : International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011
Casares-Giner, Vicente.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
24
Mark
Physically unclonable functions (PUFs) : applications, models, and future directions
Wachsmann, Christian.
San Rafael, California : Morgan & Claypool Publishers, [2015]
Access this resource online
2015
EBOOKS
25
Mark
Post-Quantum Cryptography : 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 ?
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
26
Mark
Privacy Enhancing Technologies : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July
Fischer-Hübner, Simone.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
27
Mark
Security of block ciphers : from algorithm design to hardware implementation
Sakiyama, Kazuo, 1971-
Singapore : Wiley, [2015]
Access this resource online
2015
EBOOKS
28
Mark
Security Protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Sele
Christianson, Bruce.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
29
Mark
Security Technology International Conference SecTech 2011, Held as Part of the Future Generation Inf
SecTech (Conference) (2011 : Cheju Island, Korea), creator
Heidelberg : Springer, [2011]
Access this resource online
2011
EBOOKS
30
Mark
Selected Areas in Cryptography : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, A
Biryukov, Alex.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
31
Mark
Smart Card Research and Advanced Applications : 10th IFIP WG 8.8/11.2 International Conference, CARD
Prouff, Emmanuel.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
32
Mark
SSH, the secure shell : the definitive guide.
Barrett, D. J.
Sebastopol : O'Reilly, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 BAR
4 WEEK LOAN
AVAILABLE
33
Mark
Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 2
Theory of Cryptography Conference (8th : 2011 : Providence, R.I.) author
Heidelberg: Springer, [2011]
Access this resource online
2011
EBOOKS
34
Mark
Transactions on Data Hiding and Multimedia Security VI
Shi, Yun Q.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
35
Mark
Trust Management V 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, Jun
Wakeman, Ian.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Access this resource online
2011
EBOOKS
36
Mark
Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 201
Chen, Liqun.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Access this resource online
2011
EBOOKS
37
Mark
Writing secure code
Howard, Michael, 1965-
Redmond, Wash. : Microsoft Press, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 H8
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 H8
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 H8
8 WEEK LOAN
AVAILABLE
Click to view copies/volumes at all libraries
38
Mark
Writing secure code practical strategies and proven techniques for building secure applications in a
Howard, Michael, 1965-
Redmond, Wash. : Microsoft, c2003.
Access this resource online
c2003
EBOOKS