Your search returned 21 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Composition of secure multi-party protocols : a comprehensive study / Yehuda Lindell. by Series: Lecture notes in computer science ; 2815.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, 2003
Online resources:
Availability: Items available for loan: e-Library (1).
2.
Public key cryptography-- PKC 2006 : 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings / Moti Yung [and others] (eds.). by Series: Lecture notes in computer science ; 3958.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 11745853
Publication details: Berlin ; New York : Springer, ©2006
Other title:
  • PKC 2006
  • 9th International Conference on Theory and Practice of Public-Key Cryptography
  • Ninth International Conference on Theory and Practice of Public-Key Cryptography
In: OhioLINK electronic book center In: SpringerLink
Online resources:
Availability: Items available for loan: e-Library (1).
3.
Advances in cryptology : EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006 : proceedings / Serge Vaudenay (ed.). by Series: Lecture notes in computer science ; 4004. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 11761679
Publication details: Berlin ; New York : Springer, ©2006
Other title:
  • EUROCRYPT 2006
  • 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques
  • Twenty-fourth Annual International Conference on the Theory and Applications of Cryptographic Techniques
  • International Conference on the Theory and Applications of Cryptographic Techniques
Online resources:
Availability: Items available for loan: e-Library (1).
4.
Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers / Øyvind Ytrehus (ed.). by Series: Lecture notes in computer science ; 3969. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2006
Other title:
  • WCC 2005
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
5.
Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings / Roland Büschkes, Pavel Laskov (eds.). by Series: Lecture notes in computer science ; 4064.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin ; New York : Springer, ©2006
Other title:
  • DIMVA 2006
Online resources:
Availability: Items available for loan: e-Library (1).
6.
Secure data management : third VLDB workshop, SDM 2006, Seoul, Korea, September 10-11, 2006 ; proceedings / Willem Jonker, Milan Petković (eds.). by Series: LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI. | Lecture notes in computer science ; 4165.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2006
Other title:
  • SDM 2006
  • 3rd VLDB workshop, SDM 2006, Seoul, Korea, September 10-11, 2006
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
7.
Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings / Daniel J. Bernstein, Tanja Lange, Eds. by Series: Lecture notes in computer science ; 6055. | LNCS sublibrary. SL 4, Security and cryptology.
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 80013130
Publication details: Berlin ; New York : Springer, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
8.
Modern cryptology : a tutorial / Gilles Brassard. by Series: Lecture notes in computer science ; 325.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New York : Springer-Verlag, ©1988
Online resources:
Availability: Items available for loan: e-Library (1).
9.
10.
Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings / D.W. Davies (ed.). by Series: Lecture notes in computer science ; 547.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer-Verlag, ©1991
Other title:
  • EUROCRYPT '91
Online resources:
Availability: Items available for loan: e-Library (1).
11.
Progress in cryptology - LATINCRYPT 2017 : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, revised selected papers / Tanja Lange, Orr Dunkelman (Eds.). by Series: Lecture notes in computer science ; 11368. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer, [2019]
Online resources:
Availability: Items available for loan: e-Library (1).
12.
Integrated security systems design : concepts, specifications, and implementation / Thomas Norman. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier Butterworth-Heinemann, ©2007
Online resources:
Availability: Items available for loan: e-Library (1).
13.
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques / Vyacheslav Fadyushin, Andrey Popov. by Series: Community experience distilled
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2016
Online resources:
Availability: Items available for loan: e-Library (1).
14.
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework / Abhinav Singh. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Pub., 2012
Online resources:
Availability: Items available for loan: e-Library (1).
15.
Role mining in business : taming role-based access control administration / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Singapore : World Scientific, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
16.
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / Vivek Ramachandran. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham [U.K.] : Packt Pub., 2011
Online resources:
Availability: Items available for loan: e-Library (1).
17.
Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing Ltd, 2019
Online resources:
Availability: Items available for loan: e-Library (1).
18.
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit / Nipun Jaswal. by
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing, 2016
Online resources:
Availability: Items available for loan: e-Library (1).
19.
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / Kevin Cardwell. by Series: Community experience distilled
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, [2016]Copyright date: ©2016
Online resources:
Availability: Items available for loan: e-Library (1).
20.
Penetration tester's open source toolkit / Johnny Long [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Pub., ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha