Your search returned 14 results. Subscribe to this search

|
1. Introduction to computer security

by Bishop, Matt; Venkatramanayya, Sathyanarayana S.

Publisher: New Delhi : Dorling-Kindersley 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/BIS/2006] (1).

2. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Publisher: Indianapolis, IN: John Wiley, 2008Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8/AND/2008] (2).

3. Design of Rijndael AES--the Advanced Encryption Standard

by Daemen, Joan; Rijmen, Vincent.

Edition: 1st ed.Publisher: New York Springer-Verlag 2002Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/DAE/2002] (2).

4. Data privacy and security

by Kenny, J. J. P.

Edition: 1st ed.Publisher: Oxford Pergamon Infotech 1985Availability: Items available for loan: Central Library, BUET [658.054044/KEN/1985] (1).

5. Introduction to hardware security and trust

by Tehranipoor, Mohammad; Wang, Cliff.

Edition: 1st ed.Publisher: New York Springer Science+Business Media 2012Availability: Items available for loan: Central Library, BUET [005.8/TEH/2012] (2).

6. Network interdiction and stochastic integer programming

by Woodruff, David L.

Edition: 1st ed.Publisher: Boston Kluwer Academic Publishers 2003Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/WOO/2003] (2).

7. Hardware security design, threats, and safeguards

by Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra.

Edition: 1st ed.Publisher: London Taylor & Francis 2015Availability: Items available for loan: Central Library, BUET [005.8/MUK/2015 ] (2).

8. Cyber security in business and management

by Mason, Stephen.

Edition: 1st ed.Publisher: New York Willford press 2016Availability: Items available for loan: Central Library, BUET [005.8/MAS/2016] (2).

9. Advanced malware analysis

by Elisan, Christopher C.

Edition: 1st ed.Publisher: New York Mc Graw Hill 2015Availability: Items available for loan: Central Library, BUET [005.8/ELI/2015] (1).

10. Computer security and the internet Tools and jewels from malware to bitcoin

by Van Oorschot, Paul C.

Edition: 2nd ed. Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/VAN/2021] (1).

11. Guide to computer network security

by Kizza, Joseph Migga.

Edition: 5th ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KIZ/2020] (1).

12. Emerging topics in hardware security

by Tehranipoor, Mark.

Edition: 1st ed.Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/TEH/2021] (1).

13. Cyber-physical systems a model-based approach

by Taha, Walid M; Taha, Abd-Elhamid M; Thunberg, Johan.

Edition: 1st ed.Publisher: Cham Springer 2021Availability: Items available for loan: Central Library, BUET [005.8/TAH/2021] (1).

14. Fundamentals of digital forensics theory, methods. and real-life applications

by Kavrestad, Joakim.

Edition: 2nd ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KAV/2020] (1).