Your search returned 12 results.

Sort
Results
1.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Cyber-security of SCADA and other industrial control systems Colbert Edward J M ed.; Kott Alexander by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Switzerland Springer 2016
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q6.

2.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Data warehousing and data mining techniques for cyber security by Singhal Anoop by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer Science+Business Media 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B),27 P7.

3.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Data warehousing and data mining techniques for cyber security by Singhal Anoop by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer Science+Business Media 2007
Availability: No items available.

4.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Network security policies and procedures by Frye Douglas W by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer Science+Business Media 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P7 TD.

5.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Network security policies and procedures by Frye Douglas W by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer Science+Business Media 2007
Availability: No items available.

6.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Secure data management in decentralized systems by Yu Ting Ed.; Jajodia Sushil Ed. by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3:(894) P7 TD.

7.
Image from Google Jackets
Image from OpenLibrary
Secure data management in decentralised systems by Yut Ting Ed.; Jajodia Sushil Ed. by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2007
Availability: No items available.

8.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Security for telecommunications networks by Traynor Patrick; McDaniel Patrick; Porta Thomas La by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,4:(894) P8 TD.

9.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Indentifying malicious code through reverse engineering by Abhishek Singh Ed. by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

10.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Security for wireless sensor networks by Liu Donggang; Ning Peng by Series: Advances in information security; 28
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer-Science+Business Media 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,42:(894) P7 TD.

11.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Insider threats in cyber security by Probst Christian W Ed.; Hunker Jeffrey Ed.; Gollmann Dieter Ed.; Bishop Matt Ed. by Series: Advances in information security, 49
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

12.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Applications of data mining in computer security by Barbara Daniel Ed.; Jajodia Sushil Ed. by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Springer 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P2 TD.