Search again

Found: 12  Titles

Order by :    Show:   Per Page
image
Applied information security a hands-on approach / David Basin, Patrick Schaller, Michael Schl�apfer
Author
Basin, David.
Published
Berlin : Springer, c2011.
Call Number
Ebook

image

image

image
Decrypted secrets methods and maxims of cryptology / Friedrich L. Bauer
Author
Bauer, Friedrich L.
Published
Berlin : Springer, c2007
Call Number
Ebook

image

image

image
Malware detection edited by Mihai Christodorescu ... [et al.]
Published
New York : Springer, 2007.
Call Number
Ebook

image
Mining heterogeneous information networks principles and methodologies / Yizhou Sun and Jiawei Han
Author
Sun, Yizhou
Published
[San Rafael, CA] : Morgan & Claypool, c2012.
Call Number
Ebook

image
Online business security systems by Godfried B. Williams
Author
Williams, Godfried
Published
New York : Springer, c2007.
Call Number
Ebook

image
Operating system security Trent Jaeger
Author
Jaeger, Trent
Published
San Rafael, CA : Morgan & Claypool, c2008
Call Number
Ebook

image
Security basics for computer architects / Ruby B. Lee.
Author
Lee, Ruby B.,
Call Number
MoCl 6812828 IEEE,QA76.9.A25 L447 2013,005.8 23

image
Spyware and adware John Aycock
Author
Aycock, John.
Published
New York : Springer, c2011.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles