|
41.
|
Advanced concepts in operating systems : distributed, database, and multiprocessor operating systems
by Singhal, Mukesh | Shivaratri, Niranjan G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.43 SIN] (3).
|
|
42.
|
Software forensics : collecting evidence from the scene of a digital crime
by Slade, Robert M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
|
|
43.
|
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey | Shoemaker, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
44.
|
Troubleshooting, maintaining and repairing PCs
by Bigelow, Stephen J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 621.39160288 BIG] (8).
|
|
45.
|
Computer security lab manual
by Nestler, Vincent J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
|
|
46.
|
Hacking exposed Cisco networks : Cisco security secrets & solutions
by Vladimirov, Andrew A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
47.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
48.
|
Computer security : 20 things every employee should know
by Rothke, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
|
|
49.
|
Digital watermarking and steganography
by Cox, Ingemar J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
|
|
50.
|
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
by Skoudis, Ed | Liston, Tom. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
51.
|
Analyzing computer security : a threat/vulnerability/countermeasure approach
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
52.
|
Software IP detective's handbook : measurement, comparison, and infringement detection
by Zeidman, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 346.048 ZEI] (1).
|
|
53.
|
Modern VLSI design : IP-based design
by Wolf, Wayne. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2009Availability: Items available for loan: [Call number: 621.395 WOL] (1).
|
|
54.
|
Convenient action : Gujarat's response to challenges of climate change
by Modi, Narendra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: MacMillan, 2011Availability: Items available for loan: [Call number: 363.73874 MOD] (1).
|
|
55.
|
Useless arithmetic : why environmental scientists can?t predict the future
by Pilkey, Orrin H | Pilkey-Jarvis, Linda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Columbia University Press, 2006Availability: Items available for loan: [Call number: 363.705 PIL] (1).
|
|
56.
|
Securing VoIP networks : threats, vulnerabilities, and countermeasures
by Thermos, Peter | Takanen, Ari. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.695 THE] (1).
|
|
57.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
58.
|
Control of nature
by McPhee, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Farrar, Straus and Giroux, 1990Availability: Items available for loan: [Call number: 304.2 MCP] (1).
|
|
59.
|
Trust Management II : proceedings of IFIPTM 2008 : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
by Karabulut, Yucel | Herrmann, Peter | Jensen, Christian Damsgaard | Mitchell, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005 KAR] (1).
|
|
60.
|
Identifying malicious code through reverse engineering
by Singh, Baibhav | Singh, Abhishek. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).
|