Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 2 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
21.
Image from Google Jackets
Network infrastructure security
by
Weaver, Randy
Weaver, Dawn
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Cengage Learning,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WEA
.
Place hold
Save to lists
22.
Image from Google Jackets
Trusted computing
by
Mitchell, Chris
Series:
IEE professional applications of computing series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London:
Institution of Electrical Engineers,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MIT
.
Place hold
Save to lists
23.
Image from Google Jackets
Process of network security : designing and managing a safe network
by
Wadlow, Thomas A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Massachusetts:
Addison-Wesley,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WAD
.
Place hold
Save to lists
24.
Image from Google Jackets
Network security essentials : applications and standards
by
Stallings, William
Edition:
4th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Prentice Hall,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 STA
.
Place hold
Save to lists
25.
Image from Google Jackets
Exploiting online games : cheating massively distributed systems
by
Hoglund, Greg
McGraw, Gary
Series:
Addison-Wesley software security series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Addison-Wesley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HOG
.
Place hold
Save to lists
26.
Image from Google Jackets
Threat modeling
by
Swiderski, Frank
Snyder, Window
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Bangalore:
Microsoft Press,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SWI
.
Place hold
Save to lists
27.
Image from Google Jackets
Information security illuminated
by
Chapple, Mike
Solomon, Michael G
Series:
Jones and barlett illuminated series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Jones & Bartlett,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SOL
.
Place hold
Save to lists
28.
Image from Google Jackets
Network security essentials : applications and standards
by
Stallings, William
Edition:
4th ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Noida:
Pearson,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 STA
.
Place hold
Save to lists
29.
Image from Google Jackets
Computer security : principles and practice
by
Stallings, William
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Pearson,
2010
Availability:
Items available for loan:
DAU
(3)
Call number:
005.8 STA, ..
.
Place hold
Save to lists
30.
Image from Google Jackets
Protecting your PC
by
Barile, Ian
Series:
Charles Rier Media general computing series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Charles River Media,
2007
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 BAR, ..
.
Place hold
Save to lists
31.
Image from Google Jackets
Essential cybersecurity science : build, test, and evaluate secure systems
by
Dykstra, Josiah
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Sebastopol:
O'Reilly Media,
2016
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 DYK
.
Place hold
Save to lists
32.
Image from Google Jackets
Computer security fundamentals
by
Easttom, Chuck
Series:
Security series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall of India,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 EAS
.
Place hold
Save to lists
33.
Image from Google Jackets
Disappearing cryptography : information hiding, steganography and watermarking
by
Wayner, Peter
Edition:
3rd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Morgan Kaufmann,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 WAY
.
Place hold
Save to lists
34.
Image from Google Jackets
Hacking exposed Cisco networks : Cisco security secrets & solutions
by
Vladimirov, Andrew A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VLA
.
Place hold
Save to lists
35.
Image from Google Jackets
Peter Norton's network security fundamentals
by
Norton, Peter
Stockman, Mike
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 NOR
.
Place hold
Save to lists
36.
Image from Google Jackets
Building open source network security tools : components and techniques
by
Schiffman, Mike D
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indiana:
Wiley Publishing,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SCH
.
Place hold
Save to lists
37.
Image from Google Jackets
Intrusion detection : a machine learning approach
by
Yu, Zhenwei
Tsai, Jeffrey J. P
Series:
Series in electrical and computer engineering
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London:
Imperial College Press,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 YUZ
.
Place hold
Save to lists
38.
Image from Google Jackets
Cryptography for security and privacy in cloud computing
by
Rass, Stefan
Slamanig, Daniel
Series:
Artech House information security and priacy series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 RAS
.
Place hold
Save to lists
39.
Image from Google Jackets
Network security bible
by
Cole, Eric
Conley, James W
Krutz, Ronald
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Wiley-Dreamtech India,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 COL
.
Place hold
Save to lists
40.
Image from Google Jackets
CERT guide to system and network security practices
by
Allen, Julia H
Series:
SEI series in software engineering
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ALL
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion