Search again

Found: 45  Titles

Order by :    Show:   Per Page
image
Privacy and identity man[a]gement for life Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg, editors.
Author
Camenisch, Jan,
Published
Berlin : Springer, c2011.
Call Number
Ebook

image

image
Privacy vs. security Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan.
Author
Stalla-Bourdillon, Sophie.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image
Robust image encryption method with cipher stream chaining process / Sovan Tep.
Author
Sovan Tep.
Published
2018.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image

image
Security basics for computer architects Ruby B. Lee.
Author
Lee, Ruby B.
Published
[San Rafael, CA] : Morgan & Claypool, c2013.
Call Number
Ebook

image

image

image
Trust management in cloud services Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya.
Author
Noor, Talal H.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
Trustworthy execution on mobile devices Amit Vasudevan, Jonathan M. McCune, James Newsome.
Author
Vasudevan, Amit.
Published
New York, NY : Springer, c2014.
Call Number
Ebook

image
Usable security usable securiy history, themes, and challenges / Stephen Weatherill.
Author
Garfinkel, Simson.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
What is computer science? an information security perspective / Daniel Page, Nigel Smart.
Author
Page, Daniel.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
ระบบป้องกันไอพีของผู้ให้บริการอินเทอร์เน็ตติดบัญชีดำ = Protection system of internet service providers (ISP) mounted blacklist / วีรวัฒน์ โพธิ์ระย้า.
Author
วีรวัฒน์ โพธิ์ระย้า.
Published
2557.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles