Refine your search

Your search returned 79 results.

Sort
Results
1.
ITIL Foundation Exam Study Guide. by Language: eng.
Publication details: UK Wiley 2012
Availability: Items available for loan: CIBESPAM-MFL (1)Call number: 658.404 / G162.

2.
Education, Development, and Security in the contemporary world Published by the center of research and projects at the universidad Internacional del Ecuador. by Language: Eng.
Publication details: Quito, Ecuador UNIVERSIDAD INTERNACIONAL DEL ECUADOR 2007
Availability: Items available for loan: CIBESPAM-MFL (2)Call number: 370 / F363, ...

3.
4.
5.
6.
Encyclopedia of Biometrics [electronic resource] / edited by Stan Z. Li, Anil K. Jain. by Publisher: Boston, MA : Springer US : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

7.
Handbook on Data Centers [electronic resource] / edited by Samee U. Khan, Albert Y. Zomaya. by Publisher: New York, NY : Springer New York : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

8.
Secure Wireless Sensor Networks [electronic resource] : Threats and Solutions / by Mauro Conti. by Series: Advances in Information Security ; 65
Edition: 1st ed. 2015.
Publisher: New York, NY : Springer New York : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

9.
10.
Violence in Nigeria [electronic resource] : Patterns and Trends / by Patricia Taft, Nate Haken. by Series: Terrorism, Security, and ComputationPublisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

11.
Security Planning [electronic resource] : An Applied Approach / by Susan Lincke. by Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

12.
13.
Protecting Privacy in Data Release [electronic resource] / by Giovanni Livraga. by Series: Advances in Information Security ; 57Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

14.
15.
Pattern and Security Requirements [electronic resource] : Engineering-Based Establishment of Security Standards / by Kristian Beckers. by Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

16.
Counterterrorism and Cybersecurity [electronic resource] : Total Information Awareness / by Newton Lee. by
Edition: 2nd ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

17.
18.
19.
20.
21.
22.
Cybersecurity in Israel [electronic resource] / by Lior Tabansky, Isaac Ben Israel. by Series: SpringerBriefs in Cybersecurity
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

23.
24.
25.
Encrypted Email [electronic resource] : The History and Technology of Message Privacy / by Hilarie Orman. by Series: SpringerBriefs in Computer Science
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

26.
27.
28.
29.
Visual Cryptography for Image Processing and Security [electronic resource] : Theory, Methods, and Applications / by Feng Liu, Wei Qi Yan. by
Edition: 2nd ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

30.
31.
Evolution of Cyber Technologies and Operations to 2035 [electronic resource] / edited by Misty Blowers. by Series: Advances in Information Security ; 63
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

32.
Medical Data Privacy Handbook [electronic resource] / edited by Aris Gkoulalas-Divanis, Grigorios Loukides. by
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

33.
34.
35.
36.
37.
38.
39.
40.
41.
Building Secure Defenses Against Code-Reuse Attacks [electronic resource] / by Lucas Davi, Ahmad-Reza Sadeghi. by Series: SpringerBriefs in Computer Science
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

42.
43.
Quantum Computational Number Theory [electronic resource] / by Song Y. Yan. by
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
Introduction to Cryptography [electronic resource] : Principles and Applications / by Hans Delfs, Helmut Knebl. by Series: Information Security and Cryptography
Edition: 3rd ed. 2015.
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Computer Science.

55.
56.
57.
Disaster Management: Enabling Resilience [electronic resource] / edited by Anthony Masys. by Series: Lecture Notes in Social NetworksPublisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Earth and Environmental Science.

58.
59.
60.
61.
62.
63.
64.
Detecting Peripheral-based Attacks on the Host Memory [electronic resource] / by Patrick Stewin. by Series: T-Labs Series in Telecommunication ServicesPublisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

65.
66.
Security Issues in Mobile NFC Devices [electronic resource] / by Michael Roland. by Series: T-Labs Series in Telecommunication ServicesPublisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

67.
Battlefield Acoustics [electronic resource] / by Thyagaraju Damarla. by Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

68.
69.
Digital Defense [electronic resource] : A Cybersecurity Primer / by Joseph Pelton, Indu B. Singh. by
Edition: 1st ed. 2015.
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

70.
Understanding Network Hacks [electronic resource] : Attack and Defense with Python / by Bastian Ballmann. by Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

71.
72.
73.
74.
Why Cryptography Should Not Rely on Physical Attack Complexity [electronic resource] / by Juliane Krämer. by Series: T-Labs Series in Telecommunication Services
Edition: 1st ed. 2015.
Publisher: Singapore : Springer Singapore : Imprint: Springer, 2015 In: Springer eBooks
Availability: Items available for loan: (1)Call number: Engineering.

75.
76.
77.
78.
79.
Pages