Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 6 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
101.
Image from Google Jackets
Information assurance : dependability and security in networked systems
by
Qian, Yi
Series:
The Morgan Kaufmann series in networking
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Elsevier,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 QIA
.
Place hold
Save to lists
102.
Image from Google Jackets
Intrusion detection & prevention
by
Endorf, Carl
Mellander, Jim
Schultz, Eugene
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
California:
McGraw-Hill/Osborne,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 END
.
Place hold
Save to lists
103.
Image from Google Jackets
E-commerce agents : marketplace solutions, security issues, and suply and demand
by
Ye, Yiming
Liu, Jiming
Ye, Yiming
Series:
Lecture notes in artificial intelligence
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
006.3 LIU
.
Place hold
Save to lists
104.
Image from Google Jackets
Aspects of network and information security
by
Kranakis, Evangelos
Haroutunian, Evgueni A
Shahbazian, E
NATO Advanced Study Institute on Network Security and Intrusion Detection
Series:
NATO science for peace and security series. Series D, information and communication security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
IOS Press,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 KRA
.
Place hold
Save to lists
105.
Image from Google Jackets
Practical Internet security
by
Vacca, John R
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VAC
.
Place hold
Save to lists
106.
Image from Google Jackets
Hardening windows systems : bulletproof your systems before you are hacked
by
Bragg, Roberta
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BRA
.
Place hold
Save to lists
107.
Image from Google Jackets
Privacy enhancing technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004; revised selected papers
by
Martin, David
Serjantov, Andrei
Series:
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
004 MAR
.
Place hold
Save to lists
108.
Image from Google Jackets
Advances in security and payment methods for mobile commerce
by
Hu, Wen-Chen
Kou, Weidong
Lee, Chung-wei
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hershey:
Idea Group Pub.,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
658.478 HUW
.
Place hold
Save to lists
109.
Image from Google Jackets
Java 2 network security
by
Pistoia, Marco
Series:
ITSO networking series
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall,
1999
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PIS
.
Place hold
Save to lists
110.
Image from Google Jackets
Hacking Web services
by
Shah, Shreeraj
Series:
Charles Rier Media networking series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Charles River Media,
2007
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 SHA, ..
.
Place hold
Save to lists
111.
Image from Google Jackets
Network security : issues, challenges and techniques
by
Bhattacharyya, Dhruba K
Sarma, Nityananda
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Narosa Publishing House,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SAR
.
Place hold
Save to lists
112.
Image from Google Jackets
Security data visualization : graphical techniques for network analysis
by
Conti, Greg
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
San Francisco:
No Starch Press,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CON
.
Place hold
Save to lists
113.
Image from Google Jackets
Vulnerability analysis and defense for the Internet
by
Sing, Abhishek
Joseph, Hirosh
Singh, Baibhav
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SIN
.
Place hold
Save to lists
114.
Image from Google Jackets
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by
Baum, Michael S
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Jersey:
Prentice Hall,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
658.84 FOR
.
Place hold
Save to lists
115.
Image from Google Jackets
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations
by
Datta, Anupam
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
U.S.A.:
ProQuest,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DAT
.
Place hold
Save to lists
116.
Image from Google Jackets
Implementing 802.1X security solutions for wired and wireless networks
by
Geier, Jim
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Wiley Publishing,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
004.68 GEI
.
Place hold
Save to lists
117.
Image from Google Jackets
Building VPNs with IPSec and MPLS
by
Tan, Nam-Kee
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
McGraw-Hill,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 TAN
.
Place hold
Save to lists
118.
Image from Google Jackets
802.11 security
by
Potter, Bruce
Fleck, Bob
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Navi Mumbai:
Shroff Publishers,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 POT
.
Place hold
Save to lists
119.
Image from Google Jackets
Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption
by
Remy, David
Rosenberg, Jothy
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indiana:
Sams Publishing,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ROS
.
Place hold
Save to lists
120.
Image from Google Jackets
Applied information security : a hands-on approach
by
Basin, David
Schaller, Patrick
Schl�pfer, Michael
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAS
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion