|
41.
|
|
|
42.
|
|
|
43.
|
|
|
44.
|
|
|
45.
|
|
|
46.
|
Key Secure Establishment by Kim-Kwang Raymond Choo by Choo, Kim-Kwang Raymond. Material type: Text Publication details: New York Springer Verlag, Netherlands 2009Availability: Items available for reference: Not for loanCall number: REF 005.82 CHO (1). :
|
|
47.
|
|
|
48.
|
|
|
49.
|
|
|
50.
|
Hop Integrity in the Internet by Chin-Tser Huang by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Text Publication details: New York Springer 2006Availability: Items available for reference: Not for loanCall number: REF 005.8 HUA (1). :
|
|
51.
|
|
|
52.
|
|
|
53.
|
|
|
54.
|
|
|
55.
|
|
|
56.
|
Computer Security in the 21st Century by D.T. Lee by Lee, D.T | Tygar, J.D | Shieh, S.P. Material type: Text Publication details: New York Springer Verlag, Netherlands 2005Availability: Items available for loan: Call number: 005.8 LEE (1). Items available for reference: Not for loanCall number: REF 005.8 LEE (1).
|
|
57.
|
|
|
58.
|
|
|
59.
|
Principles of Information Security Michael E. Whitman by Whitman, Michael E | Mattord, Herbert J. Edition: 5th ed.Material type: Text Publication details: New Delhi Cengage Learning India Private Limited 2017Availability: Items available for loan: Call number: 005.8 WHI (3).
|
|
60.
|
|