Refine your search
Availability
-
Authors
- Agre, Philip (1)
- Andersen, Arthur (1)
- Baumgart, Rainer (1)
- Bond, Robert (1)
- Boyd, Colin (1)
- Damgard, Ivan (1)
- Dawson, Ed (1)
- Ellis, Scott (1)
- Goldreich, Oded (1)
- Imai, Hideki (1)
- Jensen, Christian D. (1)
- Kou, Weidong (1)
- Ledley, Robert Steve... (1)
- Nozaki, Micki Krause (1)
- Pfaffenberger, Bryan (1)
- Pipkin, Donald L. (1)
- Rotenberg, Marc (1)
- Schifreen, Robert (1)
- Schneier, Bruce (1)
- Thukral, Sumit K. (1)
- Tipton, Harold F. (1)
- Trinckes, John J. (1)
- Vacca, John R. (1)
- Vitek, Jan (1)
- Wang, Shuangbao Paul (1)
- Wiener, Michael (1)
- Zheng, Yuliang (1)
- Show more
- Show less
-
Holding libraries
-
Item types
- Book (20)
-
Series
-
Topics
- Algorithms (1)
- Business risk (1)
- Combinatorial analys... (1)
- Computational comple... (1)
- Computer architectur... (1)
- Computer networks--S... (1)
- Computer networks-se... (1)
- Computer science (7)
- Computer science--Ma... (1)
- Computer security (18)
- Computer security--M... (2)
- Computer software (4)
- Computers--Access co... (2)
- Cryptography (3)
- Data encryption (Com... (7)
- Data protection (6)
- Distribution (Probab... (1)
- Electronic commerce (2)
- Electronic data proc... (1)
- Electronic data proc... (1)
- Electronic funds tra... (1)
- Firewalls (Computer ... (1)
- Information age (1)
- Information security (2)
- Information technolo... (1)
- Information theory (1)
- Internet Programming (1)
- Internet security (1)
- Internet--Security m... (1)
- Management informati... (1)
- Mathematics (1)
- Mobile computing (1)
- Network-security (1)
- Operating systems (C... (4)
- Privacy techniques (1)
- Privacy, Right of (2)
- Public key cryptogra... (1)
- Risk management (1)
- Software engineering (1)
- System design (1)
- Show more
- Show less