Your search returned 30 results. Subscribe to this search

|
1. Introduction to computer security

by Bishop, Matt; Venkatramanayya, Sathyanarayana S.

Publisher: New Delhi : Dorling-Kindersley 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/BIS/2006] (1).

2. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Publisher: Indianapolis, IN: John Wiley, 2008Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8/AND/2008] (2).

3. Design of Rijndael AES--the Advanced Encryption Standard

by Daemen, Joan; Rijmen, Vincent.

Edition: 1st ed.Publisher: New York Springer-Verlag 2002Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/DAE/2002] (2).

4. Data privacy and security

by Kenny, J. J. P.

Edition: 1st ed.Publisher: Oxford Pergamon Infotech 1985Availability: Items available for loan: Central Library, BUET [658.054044/KEN/1985] (1).

5. Security engineering a guide to building dependable distributed systems

by Anderson, Ross.

Edition: 1st ed. Publisher: New York John Wiley & sons 2001Availability: No items available

6. Design of Rijndael AES--the Advanced Encryption Standard

by Daemen, Joan; Rijmen, Vincent.

Edition: 1st ed.Publisher: Berlin New York Springer 2002Availability: Items available for loan: Central Library, BUET [005.8/RIJ/2002] (1).

7. Planning for PKI best practices guide for deploying public key infrastructure

by Housley, Russ; Polk, Tim.

Edition: 1st ed.Publisher: New York John Wiley 2001Availability: Items available for loan: Central Library, BUET [005.8/HOU/2001] (1).

8. Security engineering a guide to building dependable distributed systems

by Anderson, Ross.

Edition: 1st ed.Publisher: New York John Wiley & Sons 2001Availability: Items available for loan: Central Library, BUET [005.8/AND/2001] (1).

9. Advances in biometric person authentication

by Li, Stan Z; Lai, Jianhuang. -- 5th Conference on advances in biometric person authentication 13/12/2004 Guangzhou, China.

Publisher: New York Springer-Verlag 2004Availability: Items available for loan: Central Library, BUET [006.4/CON/2004] (2).

10. Computer security handbook

by Bosworth, Seymour; Kabay, M. E; Whyne, Eric.

Edition: 5th ed.Publisher: New Jersey John Wiley & Sons 2009Availability: Items available for loan: Central Library, BUET [005.802/BOS/2009] (1).

11. Computer security handbook

by Bosworth, Seymour; Kabay, M. E; Whyne, Eric.

Edition: 5th ed.Publisher: New Jersey John Wiley & Sons 2009Availability: Items available for loan: Central Library, BUET [005.802/BOS/2009] (1).

12. Handbook on securing cyber-physical critical infrastructure foundation and challenges

by Das, Sajal K; Kant, Krishna; Zhang, Nan.

Edition: 1st ed.Publisher: Boston Elsevier 2012Availability: Items available for loan: Central Library, BUET [005.802/DAS/2012] (1).

13. Introduction to hardware security and trust

by Tehranipoor, Mohammad; Wang, Cliff.

Edition: 1st ed.Publisher: New York Springer Science+Business Media 2012Availability: Items available for loan: Central Library, BUET [005.8/TEH/2012] (2).

14. Network interdiction and stochastic integer programming

by Woodruff, David L.

Edition: 1st ed.Publisher: Boston Kluwer Academic Publishers 2003Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/WOO/2003] (2).

15. Hardware security design, threats, and safeguards

by Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra.

Edition: 1st ed.Publisher: London Taylor & Francis 2015Availability: Items available for loan: Central Library, BUET [005.8/MUK/2015 ] (2).

16. Digital forensics threatscape and best practices

by Sammons, John.

Edition: 1st ed.Publisher: Boston Elsevier 2016Availability: Items available for loan: Central Library, BUET [005.8/SAM/2016] (1).

17. Cyber security in business and management

by Mason, Stephen.

Edition: 1st ed.Publisher: New York Willford press 2016Availability: Items available for loan: Central Library, BUET [005.8/MAS/2016] (2).

18. Networking, systems and security (NSysS)

by -- Proceedings of Internatiol Conference on Networking, Systems and Security (NSyswS) Dhaka 5/1/2017; Proceedings of internatinal onference on netwoking, syustems, and security .

Publisher: Dhaka Department of Computer Science & Engineering, BUET 2017Availability: Items available for loan: Central Library, BUET [004.6/ PRO/2017] (1).

19. Introduction to computer security

by Goodrich, Michael; Tamassia, Roberto.

Edition: 1st ed. Publisher: Essex Pearson Education 2014Availability: No items available Checked out (1).

20. Design and analysis of a secure three factor user authentication scheme using biometric and smart card

by Hasan Muhammad Kafi.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2017Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [004.6/HAS/2017] (1).