Refine your search

Your search returned 350 results.

Not what you expected? Check for suggestions
Sort
Results
21.
Moving Target Defense II [electronic resource] : Application of Game Theory and Adversarial Modeling / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang. by
  • Jajodia, Sushil [editor.]
  • Ghosh, Anup K [editor.]
  • Subrahmanian, V.S [editor.]
  • Swarup, Vipin [editor.]
  • Wang, Cliff [editor.]
  • Wang, X. Sean [editor.]
  • SpringerLink (Online service)
Series: Advances in Information Security ; 100
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: New York, NY : Springer New York : Imprint: Springer, 2013
Availability: No items available.

22.
Iris Biometrics [electronic resource] : From Segmentation to Template Security / by Christian Rathgeb, Andreas Uhl, Peter Wild. by
  • Rathgeb, Christian [author.]
  • Uhl, Andreas [author.]
  • Wild, Peter [author.]
  • SpringerLink (Online service)
Series: Advances in Information Security ; 59
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: New York, NY : Springer New York : Imprint: Springer, 2013
Availability: No items available.

23.
Introduction to computer security / Matt Bishop, Sathyanarayana S. Venkatramanayya by
  • Bishop, Matt (Matthew A.)
  • Venkatramanayya, Sathyanarayana S
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2005
Online access:
Availability: Items available for loan: Central Library, SUST (1)Call number: 005.8 BII.

24.
Trust, Computing, and Society / edited by Richard H. R. Harper. by
  • Harper, Richard H. R [editor.]
Material type: Text Text; Literary form: Not fiction
Publisher: Cambridge : Cambridge University Press, 2014
Other title:
  • Trust, Computing, & Society
Availability: No items available.

25.
Security and Game Theory : Algorithms, Deployed Systems, Lessons Learned / Milind Tambe. by
  • Tambe, Milind [author.]
Material type: Text Text; Literary form: Not fiction
Publisher: Cambridge : Cambridge University Press, 2011
Other title:
  • Security & Game Theory
Availability: No items available.

26.
Information Assurance and Security Education and Training [electronic resource] : 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers / edited by Ronald C. Dodge, Lynn Futcher. by
  • Dodge, Ronald C [editor.]
  • Futcher, Lynn [editor.]
  • SpringerLink (Online service)
Series: IFIP Advances in Information and Communication Technology ; 406
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013
Availability: No items available.

27.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco. by
  • DeFranco, Joanna F [author.]
Series:
Material type: Text Text; Literary form: Not fiction
Other title:
  • Cyber security and digital forensics
Online access:
Availability: No items available.

28.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
  • McClure, Stuart
  • Shah, Saumil
  • Shah, Shreeraj
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Items available for loan: Central Library, SUST (1)Call number: 004.6 MCW.

29.
Cyber blockades [electronic resource] / Alison Lawlor Russell. by
  • Russell, Alison Lawlor [author.]
  • Project Muse
Material type: Text Text; Literary form: Not fiction
Publication details: Washington DC : Georgetown University Press, 2014. 2015)
Online access:
Availability: No items available.

30.
Computer security literacy [electronic resource] : staying safe in a digital world / Douglas Jacobson and Joseph Idziorek. by
  • Jacobson, Douglas
  • Idziorek, Joseph
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, 2013
Online access:
Availability: No items available.

31.
Cyber Security [electronic resource] : Deterrence and IT Protection for Critical Infrastructures / edited by Maurizio Martellini. by
  • Martellini, Maurizio [editor.]
  • SpringerLink (Online service)
Series: SpringerBriefs in Computer Science
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2013
Availability: No items available.

32.
Physical Layer Approaches for Securing Wireless Communication Systems [electronic resource] / by Hong Wen. by
  • Wen, Hong [author.]
  • SpringerLink (Online service)
Series: SpringerBriefs in Computer Science
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: New York, NY : Springer New York : Imprint: Springer, 2013
Availability: No items available.

33.
Automated Security Management [electronic resource] / edited by Ehab Al-Shaer, Xinming Ou, Geoffrey Xie. by
  • Al-Shaer, Ehab [editor.]
  • Ou, Xinming [editor.]
  • Xie, Geoffrey [editor.]
  • SpringerLink (Online service)
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2013
Availability: No items available.

34.
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana. by
  • Joshi, R. C
  • Sardana, Anjali
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Enfield, N.H. : Science Publishers, 2011
Online access:
Availability: No items available.

35.
Automated security management / Ehab Al-Shaer; Xinming Ou; Geoffrey Xie; by
  • Al-Shaer, Ehab
  • Ou, Xinming
  • Xie, Geoffrey
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New york : Springer, c2013
Availability: Items available for loan: Central Library, SUST (3)Call number: 005.8 AUT, ...

36.
Provable Security [electronic resource] : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings / edited by Willy Susilo, Reza Reyhanitabar. by
  • Susilo, Willy [editor.]
  • Reyhanitabar, Reza [editor.]
  • SpringerLink (Online service)
Series: Lecture Notes in Computer Science ; 8209
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013
Availability: No items available.

37.
Android security : attacks and defenses / Abhishek Dubey, Anmol Misra, by
  • Dubey, Abhishek
  • Misra, Anmol
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New york : CRC press, c2013
Availability: Items available for loan: Central Library, SUST (3)Call number: 005.8 DUA, ...

38.
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer. by
  • Macaulay, Tyson
  • Singer, Bryan
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2012
Availability: Items available for loan: Central Library, SUST (2)Call number: 658.478 MAC, ...

39.
Indian Mujahideen [electronic resource] : Computational Analysis and Public Policy / by V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan. by
  • Subrahmanian, V.S [author.]
  • Mannes, Aaron [author.]
  • Roul, Animesh [author.]
  • Raghavan, R.K [author.]
  • SpringerLink (Online service)
Series: Terrorism, Security, and Computation
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2013
Availability: No items available.

40.
IT Convergence and Security 2012 [electronic resource] / edited by Kuinam J. Kim, Kyung-Yong Chung. by
  • Kim, Kuinam J [editor.]
  • Chung, Kyung-Yong [editor.]
  • SpringerLink (Online service)
Series: Lecture Notes in Electrical Engineering ; 215
Source: Springer eBooks
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Dordrecht : Springer Netherlands : Imprint: Springer, 2013
Availability: No items available.

Pages