|
61.
|
Load Balancing Servers, Firewalls and Caches
by Kopparapu, Chandra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
|
|
62.
|
Implementing SSH : strategies for optimizing the secure shell
by Dwivedi, Himanshu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
63.
|
Cryptography, information theory, and error-correction : a handbook for the twenty first century
by Bruen, Aiden A | Forcinito, Mario A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
64.
|
Networking approach to grid computing
by Minoli, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-Interscience, 2004Availability: Items available for loan: [Call number: 004.36 MIN] (1).
|
|
65.
|
Information security : principles and practice
by Stamp, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-Interscience, 2005Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
66.
|
Business Data Communications and Networking
by Fitzgerald, Jerry | Dennis, Alan. Edition: 9th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.6 FIT] (1).
|
|
67.
|
Phishing and countermeasures : understanding the increasing problem of electronic identity theft
by Jakobsson, Markus | Myers, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
|
|
68.
|
Computer security
by Gollmann, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 1999Availability: Items available for loan: [Call number: 005.8 GOL] (2).
|
|
69.
|
Basic methods of cryptography
by Gee, Steve | Lubbe, J. C. A. van der. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1998Availability: Items available for loan: [Call number: 005.82 LUB] (1).
|
|
70.
|
Fundamentals of error-correcting codes
by Huffman, W. Cary | Pless, Vera. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2003Availability: Items available for loan: [Call number: 005.72 HUF] (1).
|
|
71.
|
Understanding Data Communications and Networks
by Shay, William A. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 004.6 SHA] (1).
|
|
72.
|
PC pest control : protect your computers from malicious internet invaders.
by Gralla, Preston. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
|
|
73.
|
Database security and auditing : protecting data integrity and accessibility
by Afyouni, Hassan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 005.8 AFY] (1).
|
|
74.
|
Peter Norton's network security fundamentals
by Norton, Peter | Stockman, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
|
|
75.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
76.
|
HTTP developer's handbook
by Shiflett, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Sams Publishing, 2003Availability: Items available for loan: [Call number: 004.678 SHI] (1).
|
|
77.
|
Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption
by Remy, David | Rosenberg, Jothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
|
|
78.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
79.
|
Unwanted gaze : a dictionary of privacy in America
by Rosen, Jeffrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
|
|
80.
|
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security
by Chandra, Praphul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|