Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 8 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
141.
Image from Google Jackets
Innocent code : a security wake up call for Web programmers.
by
Huseby, Sverre H
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
John Wiley & Sons,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HUS
.
Place hold
Save to lists
142.
Image from Google Jackets
Managing cyber threats : issues, approaches, and challenges
by
Kumar, Vipin
Lazarevic, Aleksandar
Srivastava, Jaideep
Series:
Massie computing
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
305.8 KUM
.
Place hold
Save to lists
143.
Image from Google Jackets
Security access in wireless local area networks: from architecture and protocols to realization
by
Ma, Jianfeng
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MAJ
.
Place hold
Save to lists
144.
Image from Google Jackets
Wireless networks : multiuser detection in cross-layer design
by
Mandayam, Narayan B
Comaniciu, Cristina
Poor, H. Vincent
Series:
Information technology : transmission, processing, and storage
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
621.3821 COM
.
Place hold
Save to lists
145.
Image from Google Jackets
Cryptography and network security
by
Kahate, Atul
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KAH
.
Place hold
Save to lists
146.
Image from Google Jackets
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by
Ballard, Jason
Ratliff, Bud
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall of India,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAL
.
Place hold
Save to lists
147.
Image from Google Jackets
Internet and intranet security management : risks and solutions
by
Janczewski, Lech
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hershey:
Idea Group Pub.,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 JAN
.
Place hold
Save to lists
148.
Image from Google Jackets
Disruptive security technologies with mobile code and peer to peer networks
by
Brooks, Richard R
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BRO
.
Place hold
Save to lists
149.
Image from Google Jackets
CompTIA security+ study guide : exam SY0-601
by
Chapple, Mike
Seidl, David
Series:
IEEE Xplore Wiley Data and Cybersecurity eBooks Library
Publication details:
Indianapolis :
Sybex,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
005.44769 CHA
.
Place hold
Save to lists
150.
Image from Google Jackets
Internet site security
by
Schetina, Erik
Carlson, Jacob
Greene, Ken
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Pearson Education,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SCH
.
Place hold
Save to lists
151.
Image from Google Jackets
Multidiciplinary introduction to information security
by
Mjolsnes, Stig F
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MJO
.
Place hold
Save to lists
152.
Image from Google Jackets
Security in wireless mesh networks
by
Zhang, Yan
Series:
Wireless networks and mobile communications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ZHA
.
Place hold
Save to lists
153.
Image from Google Jackets
Web security for network and system administrators
by
Mackey, David
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Course Technology,
2003
Availability:
Items available for loan:
DAU
(4)
Call number:
005.8 MAC, ..
.
Place hold
Save to lists
154.
Image from Google Jackets
Internet and intranet security
by
Oppliger, Rolf
Series:
Artech House computer security series
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OPP
.
Place hold
Save to lists
155.
Image from Google Jackets
Next generation SSH2 implementation : securing data in motion
by
Liu, Dale
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Burlington:
Syngress Publishing,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 LIU
.
Place hold
Save to lists
156.
Image from Google Jackets
Cryptography and network security : principles and practice
by
Stallings, William
Edition:
5th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 STA
.
Place hold
Save to lists
157.
Image from Google Jackets
Cyber warfare : techniques, tactics and tools for security practitioners
by
Andress, Jason
Winterfeld, Steve
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Waltham:
Syngress,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
355.343 AND
.
Place hold
Save to lists
158.
Image from Google Jackets
Elsevier's dictionary of information security in English, German, French and Russian
by
Radichkova, B
Manoilov, G
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Elsevier,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8033 MAN
.
Place hold
Save to lists
159.
Image from Google Jackets
SSL and TLS : designing and building secure systems
by
Rescorla, Eric
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 RES
.
Place hold
Save to lists
160.
Image from Google Jackets
Cryptography and network security : principles and practices
by
Stallings, William
Edition:
4th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 STA
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion