Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 4 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
61.
Image from Google Jackets
Craft of system security
by
Smith, Sean
Marchesini, John
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Jersey:
Addison-Wesley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SMI
.
Place hold
Save to lists
62.
Image from Google Jackets
Malware : fighting malicious code
by
Skoudis, Ed
Zeltser, Lenny
Series:
Prentice Hall series in computer networking and distributed systems
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Jersey:
Prentice Hall,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SKO
.
Place hold
Save to lists
63.
Image from Google Jackets
Code hacking : a developer's guide to network security
by
Cordingley, Julian
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
Shroff Publishers,
2004
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 CON, ..
.
Place hold
Save to lists
64.
Image from Google Jackets
Chained exploits : advanced hacking attacks from start to finish
by
Whitaker, Andrew
Evans, Keatron
Voth, Jack B
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Addison-Wesley,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WHI
.
Place hold
Save to lists
65.
Image from Google Jackets
SELinux by example : understanding security enhanced Linux
by
Mayer, Frank
Caplan, David
MacMillan, Karl
Series:
Prentice Hall open source software deelopment series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MAY
.
Place hold
Save to lists
66.
Image from Google Jackets
Machine learning approach to phishing detection and defense
by
Akanbi, Oluwatobi Ayodeji
Amiri, Iraj Sadegh
[author]
Fazeldehkordi, Elahe
[author]
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam :
Syngress,
2015
Availability:
Items available for loan:
DAU
(1)
Call number:
364.168 AKA
.
Place hold
Save to lists
67.
Image from Google Jackets
Collaborative financial infrastructure protection : tools, abstractions, and middleware
by
Baldoni, Roberto
Chockler, Gregory
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Heidelberg:
Springer,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAL
.
Place hold
Save to lists
68.
Image from Google Jackets
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by
Kotenko, Igor
Gorodetsky, Vladimir
Skormin, Victor A
Series:
Communications in computer and information science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GOR
.
Place hold
Save to lists
69.
Image from Google Jackets
Securing the cloud : cloud computer security techniques and tactics
by
Winkler, Vic
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Waltham:
Syngress,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WIN
.
Place hold
Save to lists
70.
Image from Google Jackets
Security for cloud storage systems
by
Yang, Kan
Jia, Xiaohua
Series:
Springer briefs in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 YAN
.
Place hold
Save to lists
71.
Image from Google Jackets
Computer security : protecting digital resources
by
Newman, Robert C
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Sudbury:
Jones & Bartlett,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 NEW
.
Place hold
Save to lists
72.
Image from Google Jackets
Security of information and communication networks
by
Kartalopoulos, Stamatios V
Series:
IEEE Press series on information & communication networks security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
Wiley,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KAR
.
Place hold
Save to lists
73.
Image from Google Jackets
Hacking : the art of exploitation
by
Erickson, Jon
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
SPD,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ERI
.
Place hold
Save to lists
74.
Image from Google Jackets
Biometrics for network security
by
Reid, Paul
Series:
Prentice Hall series in computer networking and distributed systems
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Delhi:
Pearson Education,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 REI
.
Place hold
Save to lists
75.
Image from Google Jackets
Microsoft encyclopedia of security
by
Tulloch, Mitch
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall of India,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.803 TUL
.
Place hold
Save to lists
76.
Image from Google Jackets
Security warrior
by
Peikari, Cyrus
Chuvakin, Anton
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
Shroff Publishers/O'Reilly,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PEI
.
Place hold
Save to lists
77.
Image from Google Jackets
Understanding intrusion detection through visualization
by
Axelsson, Stefan
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 AXE
.
Place hold
Save to lists
78.
Image from Google Jackets
Architecting secure software systems
by
Talukder, Asoke K
Chaitanya, Manish
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 TAL
.
Place hold
Save to lists
79.
Image from Google Jackets
Intrusion detection and correlation : challenges and solutions
by
Kruegel, Christopher
Valeur, Fredrik
Vigna, Giovanni
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 KRU
.
Place hold
Save to lists
80.
Image from Google Jackets
Network-aware security for group communications
by
Sun, Yan
Liu, K. J. R
Trappe, Wade
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SUN
.
Place hold
Save to lists
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion