Search again

Found: 7  Titles

Order by :    Show:   Per Page
image
Data protection from insider threats Elisa Bertino.
Author
Bertino, Elisa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.A25 B473 2012,005.8 23

image
Hardware malware / Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl.
Author
Krieg, Christian.,
Call Number
QA76.76.C68 K754 2013,005.8 23,MoCl 6813206 IEEE

image

image
Query answer authentication HweeHwa Pang and Kian-Lee Tan.
Author
Pang, HweeHwa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.D314 P256 2012,005.8 23

image
Reversible digital watermarking : theory and practices / Ruchira Naskar, Rajat Subhra Chakraborty.
Author
Naskar, Ruchira.,
Call Number
QA76.9.A25 N277 2014,005.8 23,MoCl 6812574 IEEE

image
Security basics for computer architects / Ruby B. Lee.
Author
Lee, Ruby B.,
Call Number
MoCl 6812828 IEEE,QA76.9.A25 L447 2013,005.8 23

image
Usable security : history, themes, and challenges / Simson Garfinkel, Heather Richter Lipford.
Author
Garfinkel, Simson.,
Call Number
QA76.9.A25 G278 2014,005.8 23,MoCL 6920435 IEEE

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles