|
41.
|
Biometrics for network security
by Reid, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
|
|
42.
|
Network security hacks : hundred industrial strength tips and tools
by Lockhart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
|
|
43.
|
Hacking : the art of exploitation
by Erickson, Jon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
|
|
44.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
45.
|
Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort
by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
46.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|
|
47.
|
Cryptography and network security : principles and practices
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
48.
|
Java 2 Network Security
by Pistoia, Marco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
49.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
50.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
51.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
52.
|
Threat modeling
by Swiderski, Frank | Snyder, Window. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
|
|
53.
|
Hunting security bugs
by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
54.
|
Hacking exposed Windows : windows security secrets & solutions
by Scambray, Joel | McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
|
|
55.
|
Firewalls : the complete reference
by Strassberg, Keith | Gondek, Richard | Rollie, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
|
|
56.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
57.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
58.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
59.
|
Digital signatures
by Atreya, Mohan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
|
|
60.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|