1. CompTIA CASP+ advanced security practitioner study guide exam CAS-003. ([2019]) Authors: Parker, Jeff T; Gregg, Michael Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Feistel ciphers : security proofs and cryptanalysis /: security proofs and cryptanalysis. ([2017]) Authors: Nachef, Valerie; Patarin, Jacques; Volte, Emmanuel Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Digital fingerprinting. ([2016]) Editors: Wang, Cliff; Gerdes, Ryan M; Guan, Yong; Kasera, Sneha Kumar Record Type: Book Extent: 1 online resource (189 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Timing channels in cryptography : a micro-architectural perspective /: a micro-architectural perspective. ([2014]) Authors: Rebeiro, Chester; Mukhopadhyay, Debdeep; Bhattacharya, Sarani Record Type: Book Extent: 1 online resource (xvii, 152 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Visual cryptography for image processing and security : theory, methods, and applications /: theory, methods, and applications. ([2015]) Authors: Liu, Feng; Yan, Wei Qi Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Android security cookbook : practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions /: practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions. (2013) Other Names: Makan, Keith; Alexander-Brown, Scott Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Visual cryptography and secret image sharing. (©2012) Other Names: Cimato, Stelvio; Yang, Ching-Nung Record Type: Book Extent: 1 online resource (xxxvi, 501 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Codes : the guide to secrecy from ancient to modern times /: the guide to secrecy from ancient to modern times. (2005) Other Names: Mollin, Richard A, 1947- Record Type: Book Extent: 1 online resource (xx, 678 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Iris biometric model for secured network access. (©2013) Other Names: Khoury, Franjieh El Record Type: Book Extent: 1 online resource (xvii, 204 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Multimedia encryption and authentication techniques and applications. (2006) Other Names: Furht, Borivoje; Kirovski, Darko Record Type: Book Extent: 1 online resource (395 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗