1. Ethereum Smart Contract Development : Build blockchain-based decentralized applications using solidity /: Build blockchain-based decentralized applications using solidity. (2018) Authors: Mukhopadhyay, Mayukh Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Practical cyber intelligence : how action-based intelligence can be an effective response to incidents /: how action-based intelligence can be an effective response to incidents. (2018) Authors: Jr, Bautista, Wilson Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. ICT systems security and privacy protection : 33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, proceedings /: 33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, proceedings. (2018) Editors: Janczewski, Lech, 1943-; Kutyłowski, Mirosław Other Names: IFIP TC11 International Information Security Conference, 33rd; IFIP World Computer Congress, 24th Record Type: Book Extent: 1 online resource (xiii, 400 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Advances in cryptology -- ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings /: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Part III : (2017) Editors: (Mathematician), Takagi, Tsuyoshi; Peyrin, Thomas Other Names: International Conference on the Theory and Application of Cryptology and Information Security, 23rd Record Type: Book Extent: 1 online resource (xviii, 473 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Transactions on large-scale data- and knowledge-centered systems XXXI : special issue on data and security engineering /: special issue on data and security engineering. (2017) Other Names: Hameurlain, Abdelkader; FDSE (Conference), 2nd; ACOMP (Conference), 9th Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Secure wireless sensor networks : threats and solutions /: threats and solutions. ([2015]) Authors: (Associate professor), Conti, Mauro Record Type: Book Extent: 1 online resource (xiii, 169 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings /: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings. (2015) Editors: Niu, Wenjia; (Computer scientist), Li, Gang; Liu, Jiqiang; Tan, Jianlong; Guo, Li; Han, Zhen; Batten, Lynn Other Names: ATIS (Conference), 6th Record Type: Book Extent: 1 online resource (xvii, 398 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cryptography and coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings. ([2015]) Other Names: Groth, Jens; IMA International Conference, 15th Record Type: Book Extent: 1 online resource (x, 328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Risks and security of internet and systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014. Revised selected papers /: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014. Revised selected papers. (2015) Editors: López, Javier; (Computer scientist), Ray, Indrajit; Crispo, Bruno Other Names: CRiSIS (Conference), 9th Record Type: Book Extent: 1 online resource (xi, 275 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Encrypted email : the history and technology of message privacy /: the history and technology of message privacy. (2015) Authors: Orman, Hilarie Record Type: Book Extent: 1 online resource (vii, 103 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗