Your search returned 14 results.

|
1.
Versatile Cybersecurity.

by Conti, Mauro | Somani, Gaurav | Poovendran, Radha.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
2.
Differential Privacy and Applications.

by Zhu, Tianqing | Li, Gang | Zhou, Wanlei | Yu, Philip S.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
3.
Cyber Defense and Situational Awareness.

by Kott, Alexander | Erbacher, Robert F | Wang, Cliff.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2015Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
4.
Network Science and Cybersecurity.

by Pino, Robinson E.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
5.
Privacy-respecting intrusion detection / by Ulrich Flegel.

by Flegel, Ulrich.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 F54 2007.
6.
Secure data management in decentralized systems / edited by Ting Yu, Sushil Jajodia.

by Yu, Ting, 1975- | Jajodia, Sushil.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .S432 2007.
7.
Network security policies and procedures / by Douglas W. Frye.

by Frye, Douglas W.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .F79 2007.
8.
Electronic postage systems : technology, security, economics / Gerrit Bleumer.

by Bleumer, Gerrit.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2007Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HE6125 .B545 2007.
9.
Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands.

by Axelsson, Stefan, 1968- | Sands, David, 1965-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .A95 2006.
10.
Multivariate public key cryptosystems / by Jintai Ding, Jason E. Gower and Dieter S. Schmidt.

by Ding, Jintai | Gower, Jason E | Schmidt, Dieter S.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York, N.Y. ; [London] : Springer, c2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 D5635 2006.
11.
Hop integrity in the Internet / by Chin-Tser Huang, Mohamed G. Gouda.

by Huang, Chin-Tser, 1971- | Gouda, Mohamed G, 1947-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, c2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H84 2006.
12.
Malware detection / Mihai Christodorescu ... [et al.].

by Christodorescu, Mihai.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, 2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M3182 2006.
13.
Security in e-learning / by Edgar R. Weippl.

by Weippl, Edgar R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York, NY : Springer, 2005Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.2 .W452 2005.
14.
Intrusion detection and correlation : challenges and solutions / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.

by Kruegel, Christopher, 1976- | Valeur, Fredrik | Vigna, Giovanni.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, 2005Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .K78 2005.