Your search returned 9 results.

2.
Java security / Scott Oaks.

by Oaks, Scott.

Publication details: O'Reilly 1998Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.73 J38Oak. (1). Damaged (1).

3.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 2nd ed.Publication details: Prentice Hall International 1999Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Sta. (1).

4.
Digital certificates : applied Internet security / Jalal Feghhi, Jalil Feghhi, Peter Williams.

by Feghhi, Jalal | Feghhi, Jalil; Williams, Peter.

Publication details: Addison-Wesley 1999Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.875 I57Feg. (1).

5.
Basic methods of crytography / Jan C. A. van der Lubbe.

by Lubbe, Jan C. A. van der.

Publication details: Cambridge University Press 1998Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Lub. (1).

6.
Building SET applications for secure transactions / Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler.

by Merkow, Mark S | Breithaupt, Jim; Wheeler, Ken L.

Publication details: J. Wiley 1998Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF5548.32 Mer. (1).

9.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publication details: Prentice Hall/Pearson Education 2003Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Sta. (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha