|
1.
|
Introduction to computer security
by Bishop, Matt;
Venkatramanayya, Sathyanarayana S.
Publisher: New Delhi : Dorling-Kindersley 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/BIS/2006] (1).
|
|
2.
|
Security engineering: a guide to building dependable distributed systems
by Anderson, Ross J.
Edition: 2nd ed.Publisher: Indianapolis, IN: John Wiley, 2008Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8/AND/2008] (2).
|
|
3.
|
Design of Rijndael AES--the Advanced Encryption Standard
by Daemen, Joan;
Rijmen, Vincent.
Edition: 1st ed.Publisher: New York Springer-Verlag 2002Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/DAE/2002] (2).
|
|
4.
|
Data privacy and security
by Kenny, J. J. P.
Edition: 1st ed.Publisher: Oxford Pergamon Infotech 1985Availability: Items available for loan: Central Library, BUET [658.054044/KEN/1985] (1).
|
|
5.
|
Security engineering a guide to building dependable distributed systems
by Anderson, Ross.
Edition: 1st ed. Publisher: New York John Wiley & sons 2001Availability: No items available
|
|
6.
|
Design of Rijndael AES--the Advanced Encryption Standard
by Daemen, Joan;
Rijmen, Vincent.
Edition: 1st ed.Publisher: Berlin New York Springer 2002Availability: Items available for loan: Central Library, BUET [005.8/RIJ/2002] (1).
|
|
7.
|
Planning for PKI best practices guide for deploying public key infrastructure
by Housley, Russ;
Polk, Tim.
Edition: 1st ed.Publisher: New York John Wiley 2001Availability: Items available for loan: Central Library, BUET [005.8/HOU/2001] (1).
|
|
8.
|
Security engineering a guide to building dependable distributed systems
by Anderson, Ross.
Edition: 1st ed.Publisher: New York John Wiley & Sons 2001Availability: Items available for loan: Central Library, BUET [005.8/AND/2001] (1).
|
|
9.
|
Advances in biometric person authentication
by Li, Stan Z;
Lai, Jianhuang.
-- 5th Conference on advances in biometric person authentication 13/12/2004 Guangzhou, China.
Publisher: New York Springer-Verlag 2004Availability: Items available for loan: Central Library, BUET [006.4/CON/2004] (2).
|
|
10.
|
Computer security handbook
by Bosworth, Seymour;
Kabay, M. E;
Whyne, Eric.
Edition: 5th ed.Publisher: New Jersey John Wiley & Sons 2009Availability: Items available for loan: Central Library, BUET [005.802/BOS/2009] (1).
|
|
11.
|
Computer security handbook
by Bosworth, Seymour;
Kabay, M. E;
Whyne, Eric.
Edition: 5th ed.Publisher: New Jersey John Wiley & Sons 2009Availability: Items available for loan: Central Library, BUET [005.802/BOS/2009] (1).
|
|
12.
|
Handbook on securing cyber-physical critical infrastructure foundation and challenges
by Das, Sajal K;
Kant, Krishna;
Zhang, Nan.
Edition: 1st ed.Publisher: Boston Elsevier 2012Availability: Items available for loan: Central Library, BUET [005.802/DAS/2012] (1).
|
|
13.
|
Introduction to hardware security and trust
by Tehranipoor, Mohammad;
Wang, Cliff.
Edition: 1st ed.Publisher: New York Springer Science+Business Media 2012Availability: Items available for loan: Central Library, BUET [005.8/TEH/2012] (2).
|
|
14.
|
Network interdiction and stochastic integer programming
by Woodruff, David L.
Edition: 1st ed.Publisher: Boston Kluwer Academic Publishers 2003Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/WOO/2003] (2).
|
|
15.
|
Hardware security design, threats, and safeguards
by Mukhopadhyay, Debdeep;
Chakraborty, Rajat Subhra.
Edition: 1st ed.Publisher: London Taylor & Francis 2015Availability: Items available for loan: Central Library, BUET [005.8/MUK/2015 ] (2).
|
|
16.
|
Digital forensics threatscape and best practices
by Sammons, John.
Edition: 1st ed.Publisher: Boston Elsevier 2016Availability: Items available for loan: Central Library, BUET [005.8/SAM/2016] (1).
|
|
17.
|
Cyber security in business and management
by Mason, Stephen.
Edition: 1st ed.Publisher: New York Willford press 2016Availability: Items available for loan: Central Library, BUET [005.8/MAS/2016] (2).
|
|
18.
|
Networking, systems and security (NSysS)
by -- Proceedings of Internatiol Conference on Networking, Systems and Security (NSyswS) Dhaka 5/1/2017;
Proceedings of internatinal onference on netwoking, syustems, and security .
Publisher: Dhaka Department of Computer Science & Engineering, BUET 2017Availability: Items available for loan: Central Library, BUET [004.6/ PRO/2017] (1).
|
|
19.
|
Introduction to computer security
by Goodrich, Michael;
Tamassia, Roberto.
Edition: 1st ed. Publisher: Essex Pearson Education 2014Availability: No items available Checked out (1).
|
|
20.
|
Design and analysis of a secure three factor user authentication scheme using biometric and smart card
by Hasan Muhammad Kafi.
Publisher: Dhaka Institute of Information and Communication Technology, BUET 2017Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [004.6/HAS/2017] (1).
|