Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 7 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
121.
Image from Google Jackets
Hacking exposed Windows : windows security secrets & solutions
by
Scambray, Joel
McClure, Stuart
Edition:
3rd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SCA
.
Place hold
Save to lists
122.
Image from Google Jackets
Internet denial of service : attack and defense mechanisms
by
Mirkovic, Jelena
Dietrich, Sven
Dittrich, David
Reiher, Peter
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Jersey:
Prentice Hall,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MIR
.
Place hold
Save to lists
123.
Image from Google Jackets
Hacker's handbook : the strategy behind breaking into and defending networks
by
Susan Young
Aitel, Dav
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Roca Raton:
CRC Press,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SUS
.
Place hold
Save to lists
124.
Image from Google Jackets
Implementing SSH : strategies for optimizing the secure shell
by
Dwivedi, Himanshu
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Wiley,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DWI
.
Place hold
Save to lists
125.
Image from Google Jackets
SSH, the secure shell : the definitive guide
by
Barrett, Daniel J
Byrnes, Robert G
Silverman, Richard E
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
Shroff Publishers,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAR
.
Place hold
Save to lists
126.
Image from Google Jackets
SSL and TLS : theory and practice
by
Oppliger, Rolf
Series:
Artech House information security and priacy series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OPP
.
Place hold
Save to lists
127.
Image from Google Jackets
Cyberspace security and defence : research issues
by
Kowalik, Janusz S
Gorski, Janusz
Sachenko, Anatoly
Series:
NATO science series. Series II, Mathematics, physics and chemistry
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Dordrecht:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 KOW
.
Place hold
Save to lists
128.
Image from Google Jackets
Information security : contemporary cases
by
Wright, Marie A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Massachusetts:
Jones & Bartlett,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WRI
.
Place hold
Save to lists
129.
Image from Google Jackets
Microsoft windows security resource kit
by
Smith, Ben
Komar, Brian
Smith, Ben
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Redmond:
Microsoft Press,
2005
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 SMI, ..
.
Place hold
Save to lists
130.
Image from Google Jackets
Secure multi-party non-repudiation protocols and applications
by
Onieva, Jose A
Lopez, Javier
Zhou, Jianying
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
658.478 ONI
.
Place hold
Save to lists
131.
Image from Google Jackets
Security for web services and service-oriented architectures
by
Bertino, Elisa
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BER
.
Place hold
Save to lists
132.
Image from Google Jackets
Security for mobile networks and platforms
by
Aissi, Selim
Dabbous, Nora
Prasad, Anand R
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
621.384 AIS
.
Place hold
Save to lists
133.
Image from Google Jackets
Web application security : a beginner's guide
by
Sullivan, Bryan
Liu, Vincent
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
006.78 SUL
.
Place hold
Save to lists
134.
Image from Google Jackets
Handbook of database security : applications and trends
by
Jajodia, Sushil
Gertz, Michael
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GER
.
Place hold
Save to lists
135.
Image from Google Jackets
Security in fixed and wireless networks : an introduction to securing data communications
by
Schafer, Gunter
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Harlow:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SCH
.
Place hold
Save to lists
136.
Image from Google Jackets
High-tech crimes revealed : cyberwar stories from the digital front
by
Branigan, Steven
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BRA
.
Place hold
Save to lists
137.
Image from Google Jackets
Wi-Foo : the secrets of wireless hacking
by
Vladimirov, Andrew A
Gavrilenko, Konstantin V
Mikhailovsky, Andrei A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VLA
.
Place hold
Save to lists
138.
Image from Google Jackets
Hacking exposed wireless : wireless security secrets & solutions
by
Cache, Johnny
Liu, Vincent
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CAC
.
Place hold
Save to lists
139.
Image from Google Jackets
Computer forensics : computer crime scene investigation
by
Vacca, John
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Massachusetts:
Charles River Media,
2002
Availability:
Items available for loan:
DAU
(2)
Call number:
363.25968 VAC, ..
.
Place hold
Save to lists
140.
Image from Google Jackets
Network security : current status and future directions
by
Serpanos, Dimitrios N
Douligeris, Christos
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
John Wiley & Sons,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DOU
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion