| | | Ω | 繻旅 |
---|---|---|---|---|
筿福盞絏厩籔戈癟 | 眎痷港 | 1993 | 167 | 筿獺┮不加 |
盞絏厩のㄤ莱ノ | 苦匪猀龙獹眎痷港 | 1995 | 505 | 筿獺┮不加 |
Title | Authors | Year | pages | Publisher | Libraries |
---|---|---|---|---|---|
A Pathology of Computer Viruses | David Ferbrache | 1992 | 299 | Springer-Verlag | 筿獺┮ |
Access Control and Personal Identification Systems | Dan M. Bowers | 1988 | 232 | Butterworths | 筿獺┮不加 |
Applied Cryptography | Bruce Schneier | 1994 | 618 | John Wiley & Sons | 筿獺┮不加 |
Computer & Communication Security: Strategies for the 1990s | James Arlin Coper | 1989 | 411 | McGraw-Hill | 筿獺┮不加 |
Commonsense Computer Security | Martin Smith | 1993 | 280 | McGraw-Hill | 筿獺┮不加 |
Contemporary Cryptology: The science of information integrity | Gustavus J. Simmons | 1991 | 640 | IEEE | 筿獺┮不加 |
Control and Security of Computer Information Systems | Philip E. Fites, Martin P. J. Kratz, and Alan F. Brebner | 1989 | 298 | Computer Science | 筿獺┮不加 |
Cryptography and Data Security | Dorothy E. R. Denning | 1982 | Addison-Wesley | 筿獺┮不加 | |
Cryptography: An Introduction to Computer | Tennifer Seberry and Josef Pieprzy | 1989 | 375 | Prentice-Hall | ユ |
Data & Computer Security: Dictionary of Standards Concepts and Terms | Dennis Longley and Michael Shain | 1990 | 428 | Stockton Press | 筿獺┮不加 |
Database Security and Integrity | E.B. Fernandez, R.C. Summers and C. Wood | 1980 | Addison-Wesley | 筿獺┮不加 | |
Differential Cryptanalysis of the Data Encryption Standard | Eli Biham and Adi Shamiw | 1993 | 188 | Springer-Verlag | 筿獺┮不加 |
EDI Implementation and Security | Paul Christmas | 1994 | 114 | Elsevier Advanced Technology | 筿獺┮不加 |
Elliptic Curve Public Key Cryptosystems | Alfred Menezes | 1993 | 128 | Kluwer Academic | 筿獺┮不加 |
Fundamentals of Computer SEcurity Technology | Edward G. Amorosr | 1994 | 401 | Prentice-Hall | 筿獺┮ |
Inference Control in Database | Tzong-An Su | 1986 | 121 | = | ユ |
Internet Firewalls and Network Security | Karanjit Siyan and Chris Hare | 1995 | 410 | New Riders | 筿獺┮ |
PC Viruses | Alan Solomon | 1991 | 288 | Springer-Verlag | 筿獺┮ |
Principles of Data Security | Erust L. Leiss | 1982 | 227 | Plenum | 睲 |
Research Directions in Database Security | Teresa F. Lunt(editor) | 1992 | 265 | Springer-Verlag | 睲 |
Security in Computing | Charles P. Pfleeger | 1989 | Prentice-Hall | 筿獺┮不加 | |
Security Mechanisms for Computer Networks | Sead Muftic | 1989 | 195 | Ellis Horwood | 筿獺┮不加 |
Security of Information and Data | T. Daler, R. Gulbrandsen, B. MelgArd, T. Sjolstad | 1989 | 133 | Ellis Horwood | 筿獺┮不加 |