|
841.
|
Handbook of security, cryptography and digital signature
by Bhaskar, S. M | Ramachandran, P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
|
|
842.
|
Hacking Web services
by Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).
|
|
843.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
|
|
844.
|
CGI Programming With Perl
by Guelich, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.75 GUE] (1).
|
|
845.
|
Programming ColdFusion
by Brooks-Bilson, Rob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai Shroff Publishers 2001Availability: Items available for loan: [Call number: 005.13 BRO] (1).
|
|
846.
|
Java in a Nutshell
by Flanagan, David. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.73 FLA] (1).
|
|
847.
|
Security warrior
by Peikari, Cyrus | Chuvakin, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
|
|
848.
|
XML, web services and the data revolution
by Coyle, Frank P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.74 COY] (1).
|
|
849.
|
Understanding Microsoft Windows 2000 Distributed Services
by Chappell, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: WP Publishers, 2000Availability: Items available for loan: [Call number: 005.437 CHA] (1).
|
|
850.
|
Social and economic security in india
by Dev, S. Mahendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Institute for Human Development, 2001Availability: Items available for loan: [Call number: 362.0954 DEV] (1).
|
|
851.
|
Relevance of GM technology to Indian agriculture and food security
by Sahai, Suman | Gene Campaign. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Gene Campaign, 2004Availability: Items available for loan: [Call number: 363.192 SAH] (1).
|
|
852.
|
Effective COM
by Box, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.437 BOX] (4).
|
|
853.
|
Applied cryptography : protocols, algorithms and source code in C
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
|
|
854.
|
IBM websphere starter kit
by Ben-Natan, Ro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw Hill, 2000Availability: Items available for loan: [Call number: 005.73 BEN] (2).
|
|
855.
|
Process of network security: Designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
856.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
857.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|
|
858.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
859.
|
Policy-based network configuration management for MANETs
by Chadha, Ritu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
860.
|
Cooperative mobile positioning : bringing social lifestyle into wireless location
by Figueiras, Joao Carlos Prazeres | Frattasi, Simone. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 621.384 FIG] (1).
|