|
|
Cryptography and network security / Behrouz A. Forouzan.
by Forouzan, Behrouz A. Publisher: Boston : McGraw Hill, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 FOR]
(1).
|
|
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
by Vacca, John R, 1947-. Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 C647]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2008]
(1).
|
|
|
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.
by Stapleton, Jeffrey James | Epstein, W. Clay. Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 S794]
(1).
|
|
|
Security in the private cloud / edited by John R. Vacca.
by Vacca, John R. Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 004.6782 S446]
(1).
|
|
|
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.
by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios. Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.82 X6]
(1).
|
|
|
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.
by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth. Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 K796]
(1).
|
|
|
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.
by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-. Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ZOU 2008]
(1).
|
|
|
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.
by Venkataramanan, Nataraj | Shriram, Ashwin. Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 V461]
(1).
|
|
|
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
by Shrobe, Howard E [editor.] | Shrier, David L [editor.] | Pentland, Alex, 1952- [editor.]. Publisher: Cambridge, MA : MIT Press, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 658.4/78]
(1).
|
|
|
Trustworthy cyber-physical systems engineering / edited by Alexander Romanovsky, Newcastle University, UK, Fuyuki Ishikawa, National Institute of Informatics, Tokyo, Japan.
by Romanovsky, Alexander, 1954- | Ishikawa, Fuyuki. Publisher: Boca Raton, Florida : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 T873]
(1).
|
|
|
Handbook of research on information and cyber security in the fourth industrial revolution / Ziska Fields, editor.
by Fields, Ziska, 1970- [editor.] | IGI Global [publisher.]. Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 658.4/78]
(1).
|
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2011]
(2).
|
|
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.
by Carvey, Harlan. Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.250968 CAR 2009]
(2).
|
|
|
Cryptography and network security / Atul Kahate.
by Kahate, Atul. Edition: 2nd ed.Publisher: New Delhi : Tata McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 KAH 2010]
(1).
|
|
|
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.
by Wayner, Peter, 1964-. Edition: 3rd ed.Publisher: Burlington, MA : Elsevier/Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 WAY 2009]
(1).
|
|
|
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
by Lillard, Terrence. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 GAR 2010]
(1).
|
|
|
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.
by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DOW 2007]
(1).
|