|
61.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
62.
|
Threat modeling
by Swiderski, Frank | Snyder, Window. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
|
|
63.
|
Hunting security bugs
by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
64.
|
Hacking exposed Windows : windows security secrets & solutions
by Scambray, Joel | McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
|
|
65.
|
Firewalls : the complete reference
by Strassberg, Keith | Gondek, Richard | Rollie, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
|
|
66.
|
Network security : the complete reference
by Bragg, Roberta | Phodes-Ousley, Mark | Strassberg, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
67.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
68.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
69.
|
Cryptography and network security
by Forouzan, Behrouz A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
70.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
71.
|
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
|
|
72.
|
Broadband network & device security
by Lail, Benjamin M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.3821 LAI] (1).
|
|
73.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
74.
|
Hardening windows systems : bulletproof your systems before you are hacked
by Bragg, Roberta. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
75.
|
Hacking exposed Cisco networks : Cisco security secrets & solutions
by Vladimirov, Andrew A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
76.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
77.
|
Data communications and network security
by Carr, Houston H | Snyder, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
|
|
78.
|
Information assurance : dependability and security in networked systems
by Qian, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
|
|
79.
|
Computer and information security handbook
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
80.
|
Disappearing cryptography : information hiding, steganography and watermarking
by Wayner, Peter. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
|