Welcome to Central Library, SUST

Your search returned 182 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
  • Schneier, Bruce, 1963-
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c1996
Availability: Items available for loan: Central Library, SUST (5)Call number: 005.82 SCA, ...

2.
Practical cryptography / Niels Ferguson, Bruce Schneier. by
  • Ferguson, Niels
  • Schneier, Bruce, 1963-
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c2003
Availability: Items available for loan: Central Library, SUST (1)Call number: 005.82 FEP.

3.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
  • McClure, Stuart
  • Shah, Saumil
  • Shah, Shreeraj
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Items available for loan: Central Library, SUST (1)Call number: 004.6 MCW.

4.
Internet security professional reference / Derek Atkins ... [et al.]. by
  • Atkins, Derek
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : New Riders Pub., c1997
Availability: Items available for loan: Central Library, SUST (2)Call number: 005.8 INT, ...

5.
Internet security : risk analysis, strategies and firewalls / Othmar Kyas by
  • Kyas, Othmar
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London. : International Thompson Computer Press, c1997
Availability: Items available for loan: Central Library, SUST (1)Call number: 004.678 KYI.

6.
Internet security : professional reference / Derek Atkins...[et al.]. by
  • Atkins, Derek
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Techmedia , c1998
Availability: Items available for loan: Central Library, SUST (3)Call number: 005.8 INT, ...

7.
Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri. by
  • Vemuri, V. Rao
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach Publications, 2006
Online access:
Availability: No items available.

8.
Investigator's guide to steganography [electronic resource] / Gregory Kipper. by
  • Kipper, Gregory
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach Publications, c2004
Online access:
Availability: No items available.

9.
Unauthorized access [electronic resource] : the crisis in online privacy and security / Robert H. Sloan and Richard Warner. by
  • Sloan, Robert H
  • Warner, Richard, 1946-
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, 2014
Online access:
Availability: No items available.

10.
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. by
  • Bhattacharyya, Dhruba K [author.]
  • Kalita, Jugal Kumar [author.]
Material type: Text Text; Literary form: Not fiction
Online access:
Availability: No items available.

11.
Discrete dynamical systems and chaotic machines [electronic resource] : theory and applications / Jacques M. Bahi, Christophe Guyeux. by
  • Bahi, Jacques Mohcine
  • Guyeux, Christophe
Series:
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, 2013
Online access:
Availability: No items available.

12.
Cryptanalysis of RSA and its variants [electronic resource] / M. Jason Hinek. by
  • Hinek, M. Jason
Series:
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2010
Online access:
Availability: No items available.

13.
Security and policy driven computing [electronic resource] / Lei Liu. by
  • Liu, Lei, 1968-
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, c2011
Online access:
Availability: No items available.

14.
Data mining and machine learning in cybersecurity [electronic resource] / Sumeet Dua and Xian Du. by
  • Dua, Sumeet
  • Du, Xian
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : Taylor & Francis, 2011
Online access:
Availability: No items available.

15.
RC4 stream cipher and its variants [electronic resource] / Goutam Paul, Subhamoy Maitra. by
  • Paul, Goutam
  • Maitra, Subhamoy, 1970-
Series:
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, c2012
Online access:
Availability: No items available.

16.
Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham. by
  • Masud, Mehedy
  • Khan, Latifur
  • Thuraisingham, Bhavani M
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, 2012
Online access:
Availability: No items available.

17.
Computer security literacy [electronic resource] : staying safe in a digital world / Douglas Jacobson and Joseph Idziorek. by
  • Jacobson, Douglas
  • Idziorek, Joseph
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, 2013
Online access:
Availability: No items available.

18.
Machine learning forensics for law enforcement, security, and intelligence [electronic resource] / Jesus Mena. by
  • Mena, Jesus
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : Taylor & Francis, 2011
Online access:
Availability: No items available.

19.
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana. by
  • Joshi, R. C
  • Sardana, Anjali
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Enfield, N.H. : Science Publishers, 2011
Online access:
Availability: No items available.

20.
Software test attacks to break mobile and embedded devices / Jon Duncan Hagar. by
  • Hagar, Jon Duncan [author.]
Series:
Material type: Text Text; Literary form: Not fiction
Online access:
Availability: No items available.

Pages