|
1.
|
Introduction to computer security
by Bishop, Matt;
Venkatramanayya, Sathyanarayana S.
Publisher: New Delhi : Dorling-Kindersley 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/BIS/2006] (1).
|
|
2.
|
Security engineering: a guide to building dependable distributed systems
by Anderson, Ross J.
Edition: 2nd ed.Publisher: Indianapolis, IN: John Wiley, 2008Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8/AND/2008] (2).
|
|
3.
|
Design of Rijndael AES--the Advanced Encryption Standard
by Daemen, Joan;
Rijmen, Vincent.
Edition: 1st ed.Publisher: New York Springer-Verlag 2002Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/DAE/2002] (2).
|
|
4.
|
Data privacy and security
by Kenny, J. J. P.
Edition: 1st ed.Publisher: Oxford Pergamon Infotech 1985Availability: Items available for loan: Central Library, BUET [658.054044/KEN/1985] (1).
|
|
5.
|
Introduction to hardware security and trust
by Tehranipoor, Mohammad;
Wang, Cliff.
Edition: 1st ed.Publisher: New York Springer Science+Business Media 2012Availability: Items available for loan: Central Library, BUET [005.8/TEH/2012] (2).
|
|
6.
|
Network interdiction and stochastic integer programming
by Woodruff, David L.
Edition: 1st ed.Publisher: Boston Kluwer Academic Publishers 2003Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/WOO/2003] (2).
|
|
7.
|
Hardware security design, threats, and safeguards
by Mukhopadhyay, Debdeep;
Chakraborty, Rajat Subhra.
Edition: 1st ed.Publisher: London Taylor & Francis 2015Availability: Items available for loan: Central Library, BUET [005.8/MUK/2015 ] (2).
|
|
8.
|
Cyber security in business and management
by Mason, Stephen.
Edition: 1st ed.Publisher: New York Willford press 2016Availability: Items available for loan: Central Library, BUET [005.8/MAS/2016] (2).
|
|
9.
|
Advanced malware analysis
by Elisan, Christopher C.
Edition: 1st ed.Publisher: New York Mc Graw Hill 2015Availability: Items available for loan: Central Library, BUET [005.8/ELI/2015] (1).
|
|
10.
|
Computer security and the internet Tools and jewels from malware to bitcoin
by Van Oorschot, Paul C.
Edition: 2nd ed. Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/VAN/2021] (1).
|
|
11.
|
Guide to computer network security
by Kizza, Joseph Migga.
Edition: 5th ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KIZ/2020] (1).
|
|
12.
|
Emerging topics in hardware security
by Tehranipoor, Mark.
Edition: 1st ed.Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/TEH/2021] (1).
|
|
13.
|
Cyber-physical systems a model-based approach
by Taha, Walid M;
Taha, Abd-Elhamid M;
Thunberg, Johan.
Edition: 1st ed.Publisher: Cham Springer 2021Availability: Items available for loan: Central Library, BUET [005.8/TAH/2021] (1).
|
|
14.
|
Fundamentals of digital forensics theory, methods. and real-life applications
by Kavrestad, Joakim.
Edition: 2nd ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KAV/2020] (1).
|