Asia Pacific University Library catalogue


Your search returned 23 results.

|
1.
Fundamentals of computer security / Josef Pieprzyk.Thomas Hardjono.Jennifer Seberry.

by Pieprzyk, Josef, 1949- | [Hardjono,Thomas.] | Seberry,Jennifer.

Series: Monographs in theoretical computer scienceMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Berlin : New York : Springer, c2003Online access: Publisher description | Table of contents only Availability: No items available : Withdrawn (3).

2.
Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)- / Mario Heiderich ... [et al.].

by Heiderich, Mario.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Elsevier/Syngress, c2011Availability: Items available for loan: APU LibraryCall number: QA76.625 .W43 2011 c.1 (1).

3.
Java cryptography / Jonathan Knudsen.

by Knudsen, Jonathan.

Series: Java series (O'Reilly & Associates)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol, Calif. : O'Reilly, c1998Online access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.73.J38 K58 1998 c.1 (1).

4.
RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.

by Burnett, Steve | Paine, Stephen | RSA Security.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Osborne/McGraw-Hill, c2001Other title: Official guide to cryptography.Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B87 2001 c.1 (1), APIIT LibraryCall number: CD-25-71 (1).

5.
Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI / Richard Bondi.

by Bondi, Richard, 1963-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Wiley, c2000Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: APU LibraryCall number: QA76.73.B3 B66 2000 c.2 (2), APIIT LibraryCall number: CD-24-72 (2).

6.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S3 1996 c.2 (3). Withdrawn (3).

7.
Practical cryptography / Niels Ferguson, Bruce Schneier.

by Ferguson, Niels | Schneier, Bruce, 1963-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Indiana : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 F47 2003 c.4 (4).
  (1 votes)
8.
Understanding cryptography : a textbook for students and practitioners / Christof Paar, Jan Pelzl ; foreword by Bart Preneel.

by Paar, Christof, 1963- | Pelzl, Jan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Heidelberg ; New York : Springer, c2010Availability: Items available for loan: APU LibraryCall number: Z104 .P33 2010 c.2 (2).

9.
Cryptography : theory and practice / Douglas R. Stinson.

by Stinson, Douglas R. (Douglas Robert), 1956-.

Series: The CRC Press series on discrete mathematics and its applicationsEdition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton : Chapman & Hall/CRC, c2006Online access: Publisher description Availability: Items available for loan: APU LibraryCall number: QA268 .S75 2006 c.1 (2).

10.
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

by Wayner, Peter, 1964-.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2009Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W39 2009 c.2 (3).

11.
Modern cryptanalysis : techniques for advanced code breaking / Christopher Swenson.

by Swenson, Christopher, 1983-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S94 2008 c.2 (2).

12.
Cryptography and network security / Atul Kahate.

by [Kahate, Atul . ].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India : Tata McGraw Hill , c2003Availability: No items available : Damaged (1).

13.
Defending your digital assets against hackers, crackers, spies, and thieves / Randall K. Nichols, Daniel J. Ryan, Julie J.C.H. Ryan.

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie J.C.H.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2000Availability: No items available : Withdrawn (1).

14.
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection / Christian Collberg, Jasvir Nagra.

by Collberg, Christian | Nagra, Jasvir.

Series: Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2010 c.1 (1).

15.
Cryptanalysis : a study of ciphers and their solution / Helen Fouché Gaines.

by Gaines, Helen Fouché.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York, Dover Publications c1956Availability: No items available : Damaged (1).

16.
Introduction to cryptography and network security / Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Series: McGraw-Hill Forouzan networking seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : McGraw-Hill Higher Education, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .F67 2008 c.1 (1), APIIT LibraryCall number: CD-38-98 (1).

17.
Introduction to cryptolology and PC security / Brian Beckett.

by Beckett, Brian | Beckett, Brian. Introduction to cryptology.

Material type: Text Text Publication details: London : McGraw-Hill Pub, c1997Availability: Items available for loan: APU LibraryCall number: QA76.9 .B43 1997 c.1 (1).

18.
Cryptography in the database : the last line of defense / Kevin Kenan.

by Kenan, Kevin.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ. : Addison Wesley, c2006Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.D314 K45 2005 c.1 (1).

19.
GUI BASED THREE ORDERS MIXTURE ALGORITHM OF AUDIO STEGANOGRAPHY COMBINING CRYPTOGRAPHY / LEE MUN CHUN.

by LEE MUN CHUN (TP028714) | Dr. Lau Chee Yong [Supervisor.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Kuala Lumpur : Asia Pacific University, 2017Dissertation note: A project submitted in partial fulfillment of the requirement of Asia Pacific University of Technology and Innovation for the Degree of B.Eng (Hons) in Telecommunication Engineering (UC4F1610TE). Online access: Available in APres - Requires login to view full text. Availability: Items available for reference: APU Library Not for loanCall number: PG-22-0036 (1). :

20.
IMAGE FORENSICS TOOL WITH STEGANOGRAPHY DETECTION / ED KENETH JOEL MELANIE.

by ED KENETH JOEL MELANIE (TP043358) | Ms. Maryam Var Naseri [Supervisor.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Kuala Lumpur : Asia Pacific University, 2019Dissertation note: A project submitted in partial fulfillment of the requirements of Staffordshire University for the degree of BSc. (Hons) in Forensic Computing (APT3F1810FRC). Online access: Available in APres - Requires login to view full text. Availability: Items available for reference: APU Library Not for loanCall number: PG-21-0101 (1). :