|
141.
|
Cryptography and network security : principles and practices
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
142.
|
International conference on information security, ICIS-2005, December 7-9, 2005, proceedings
by Aghila, G | Gnanadass, R | Pondicherry Engineering College, Pondicherry | Sudha, Gnanou Florence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Allied Publishers, 2005Availability: Items available for loan: [Call number: 005.8 AGH] (1).
|
|
143.
|
Java 2 Network Security
by Pistoia, Marco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
144.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
145.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
146.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
147.
|
Threat modeling
by Swiderski, Frank | Snyder, Window. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
|
|
148.
|
Hunting security bugs
by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
149.
|
Information Warfare and Security
by Denning, Dorothy E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
150.
|
Security+
by Calvert, Ben | Boswell, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
151.
|
Basics of contemporary cryptography for IT practitioners
by Ryabko, Boris | Fionov, Andrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
|
|
152.
|
Hacking exposed Windows : windows security secrets & solutions
by Scambray, Joel | McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
|
|
153.
|
Incident response: investigating computer crime
by Prosise, Chris | Mandia, Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 364.168 PRO] (1).
|
|
154.
|
Public key infrastructure : concepts, design and deployment
by Saxena, Ashutosh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SAX] (1).
|
|
155.
|
Firewalls : the complete reference
by Strassberg, Keith | Gondek, Richard | Rollie, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
|
|
156.
|
Software forensics : collecting evidence from the scene of a digital crime
by Slade, Robert M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
157.
|
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey | Shoemaker, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
158.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
159.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
160.
|
Principles of computer security : security+ and beyond
by White, Gregory B | Cothren, Chuck | Williams, Dwayne. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
|