Research Catalog
New! Try our Article Search to discover online journals, books, and more from home with your library card.
Displaying 1-5 of 5 results
Protection and security on the information superhighway / Frederick B. Cohen.
- Text
- New York : Wiley, ©1995.
- 1995
- 1 Item
Item details Format Call Number Item Location Text QA76.9.A25 C59 1995 Off-site Not available - Please for assistance.PC magazine fighting spyware, viruses, and malware / Ed Tittel.
- Text
- Indianapolis, IN : Wiley Pub., ©2005.
- 2005
- 1 Item
Item details Format Call Number Item Location Text QA76.9.A25 T57 2005 Off-site Not available - Please for assistance.Advances in cryptology--EUROCRYPT '88 : Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988: proceedings / Christoph G. Günther (ed.).
- Text
- Berlin ; New York : Springer-Verlag, ©1988.
- 1988
- 1 Item
Item details Format Call Number Item Location Text QA76.9.A25 E964 1988 Off-site Not available - Please for assistance.Security mechanisms for computer networks / Sead Muftic and P. Christoffersson [and others].
- Text
- Chichester, West Sussex, England : Ellis Horwood ; New York : Halsted Press, 1989.
- 1989
- 1 Item
Item details Format Call Number Item Location Text QA76.9.A25 M84 1989 Off-site Not available - Please for assistance.Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991 / Bart Preneel, René Govaerts, Joos Vandewalle, (eds.).
- Text
- Berlin ; New York : Springer-Verlag, ©1993.
- 1993
- 1 Item
Item details Format Call Number Item Location Text QA76.9.A25 C6373 1993 Off-site Not available - Please for assistance.
No results found from Digital Research Books Beta
Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.
Explore Digital Research Books Beta