|
121.
|
Practical cryptography
by Schneier, Bruce | Ferguson, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
122.
|
Network security bible
by Cole, Eric | Conley, James W | Krutz, Ronald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
123.
|
Computer security
by Gollmann, Dieter. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 GOL] (1).
|
|
124.
|
Corporate computer and network security
by Panko, Raymond R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
|
|
125.
|
Computer security : art and science
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (3). Items available for reference: [Call number: 005.8 BIS] (1).
|
|
126.
|
Biometrics for network security
by Reid, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
|
|
127.
|
Firewalls and Internet security : repelling the wily hacker
by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
128.
|
Computer forensics : computer crime scence investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
129.
|
Oracle Security
by Theriault, Marlene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 1999Availability: Items available for loan: [Call number: 005.74 THE] (1).
|
|
130.
|
Network security hacks : hundred industrial strength tips and tools
by Lockhart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
|
|
131.
|
Web Security, Privacy and Commerce
by Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
132.
|
MCSE/MCSA implementing and administering security in a Windows 2000 network
by Schmied, Will. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (2).
|
|
133.
|
Managing cisco network security
by Knipp, Eric. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 KNI] (1).
|
|
134.
|
Hacking : the art of exploitation
by Erickson, Jon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
|
|
135.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
136.
|
Security assessment : case studies for implementing the NSA IAM
by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
137.
|
Stealing the network : how to own continent
by Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 RUS] (1).
|
|
138.
|
Cryptography in C and C++
by Welschenbach, Michael | Kramer, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
|
|
139.
|
Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort
by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
140.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|