Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Internet -Security measures"', page 2 of 2
Refine your search
Availability
Limit to records with available items
Authors
Aharony, Nadav
Altshuler, Yaniv
Ballard, Jason
Camp, L. Jean
Carlson, Jacob
Chuat, Laurent
Cremers, Armin B.
Crume, Jeff
Denning, Dorothy E.
Denning, Peter J.
Dietrich, Sven
Dittrich, David
Dubuisson, Olivier
Egan, Mark
Elovici, Yuval
Endorf, Carl
Ghosh, Anup K.
Gouda, Mohamed G.
Gralla, Preston
Oppliger, Rolf
Show more
Show less
Item types
Books
Series
Adances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall/CRC cryptography and network security
NATO science for peace and security series. Series D, information and communication security
Prentice-Hall PTR Web infrastructure series
Show more
Show less
Topics
Abstract Syntax Notation. One (ASN.1)
ARPANET
Business enterprises -- Computer networks -- Security measures
Cellular telephone systems -- Access control
Computer network protocols
Computer networks -- Security measures
Computer security
COMPUTERS / Networking / General
COMPUTERS / Security / General
COMPUTERS / Software Development & Engineering / General
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet
Internet governance
Internet -- Security measures
Internet Security measures
Intranets (Computer networks) -- Security measures
Privacy, Right of
Security measures
Wireless Internet -- Security measures
Show more
Show less
Your search returned 37 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
21.
Image from Google Jackets
Internet site security
by
Schetina, Erik
Carlson, Jacob
Greene, Ken
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Pearson Education,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SCH
.
Place hold
Save to lists
22.
Image from Google Jackets
Internet security : hacking, counterhacking, and society
by
Himma, Kenneth Einar
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Massachusetts:
Jones & Bartlett,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HIM
.
Place hold
Save to lists
23.
Image from Google Jackets
Internet and intranet security
by
Oppliger, Rolf
Series:
Artech House computer security series
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OPP
.
Place hold
Save to lists
24.
Image from Google Jackets
Internet besieged : countering cyberspace scofflaws
by
Denning, Dorothy E
Denning, Peter J
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
1998
Availability:
Items available for loan:
DAU
(1)
Call number:
364.168 DEN
.
Place hold
Save to lists
25.
Image from Google Jackets
E-commerce security : weak links, best defenses
by
Ghosh, Anup K
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
John Wiley & Sons,
1998
Availability:
Items available for loan:
DAU
(1)
Call number:
658.478 GHO
.
Place hold
Save to lists
26.
Image from Google Jackets
Trust and risk in Internet commerce
by
Camp, L. Jean
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
The MIT Press,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CAM
.
Place hold
Save to lists
27.
Image from Google Jackets
Unauthorized access : the crisis in online privacy and security
by
Sloan, Robert H
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
323.4302854678 SLO
.
Place hold
Save to lists
28.
Image from Google Jackets
IPSec : the new security standard for the Internet, intranets, and virtual private networks2nd ed.
by
Harkins, Dan
Series:
Prentice-Hall PTR Web infrastructure series
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Delhi:
Pearson Education,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.821 DOR
.
Place hold
Save to lists
29.
Image from Google Jackets
Anonymous communication networks : protecting privacy on the web
by
Peng, Kun
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PEN
.
Place hold
Save to lists
30.
Image from Google Jackets
Non-Repudiation in electronic commerce
by
Zhou, Jianying
Series:
Artech House computer security series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ZHO
.
Place hold
Save to lists
31.
Image from Google Jackets
Executive guide to information security : threats, challenges, and solutions
by
Egan, Mark
Mather, Tim
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Addison-Wesley,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 EGA
.
Place hold
Save to lists
32.
Image from Google Jackets
Security in the cyber age : an introduction to policy and technology
by
Reveron, Derek S
Savage, John E
Publication details:
Cambridge :
Cambridge University Press,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
363.325 REV
.
Place hold
Save to lists
33.
Image from Google Jackets
Handbook of financial cryptography and security
by
Rosenberg, Burton
Series:
Chapman & Hall/CRC cryptography and network security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
332.178 ROS
.
Place hold
Save to lists
34.
Image from Google Jackets
Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
by
Last, Mark
Kandel, Abraham
Series:
NATO science for peace and security series. Series D, information and communication security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
IOS Press,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
006.312 LAS
.
Place hold
Save to lists
35.
Image from Google Jackets
Cellular authentication for mobile and internet services
by
Holtmanns, Silke
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
Wiley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HOL
.
Place hold
Save to lists
36.
Image from Google Jackets
ASN.1 communication between heterogeneous systems
by
Dubuisson, Olivier
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
San Diego:
Morgan Kaufmann,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
004.35 DUB
.
Place hold
Save to lists
37.
Image from Google Jackets
SCION : a secure internet architecture
by
Perrig, Adrian
Szalachowski, Pawel
Reischuk, Raphael M
Chuat, Laurent
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Switzerland
Springer
2017
Availability:
Items available for loan:
DAU
(1)
Call number:
004.678 PER
.
Place hold
Save to lists
First
Previous
1
2
Not finding what you're looking for?
Make a
purchase suggestion