|
801.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
802.
|
SOA security
by Kanneganti, Ramarao. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2008Availability: Items available for loan: [Call number: 005.8 KAN] (1).
|
|
803.
|
Cyber laws : Indian and international perspectives on key topics including data security, e-commerce, cloud Computing and cyber crimes
by Viswanathan, Aparna. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Gurgaon: LexisNexis Butterworths, 2012Availability: Items available for loan: [Call number: 348.02 VIS] (1).
|
|
804.
|
Easy to build electronic alarms
by Sharma, M. C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: BPB Publications, 1998Availability: Items available for loan: [Call number: 621.38928 SHA] (1).
|
|
805.
|
SSH, the secure shell : the definitive guide
by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
806.
|
Beautiful security : leading security experts explain how they think
by Oram, Andy | Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Beijing: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 ORA] (1).
|
|
807.
|
Cloud security and privacy : an enterprise perspective on risks and compliance
by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Shroff Publishers, 2009Availability: Items available for loan: [Call number: 005.8 MAT] (1).
|
|
808.
|
Network security : issues, challenges and techniques
by Bhattacharyya, Dhruba K | Sarma, Nityananda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
|
|
809.
|
Applications of data mining in computer security
by Barbara, Daniel | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
|
|
810.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
|
|
811.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
|
|
812.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
813.
|
Security in distributed and networking systems
by Xiao, Yang | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
|
|
814.
|
Advances in artificial intelligence for privacy protection and security
by Solanas, Agusti | Mart�nez-Balleste, Antoni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
815.
|
Proceedings of the first international workshop on coding and cryptology
by Li, Yongqing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
|
|
816.
|
Security in AD-HOC and sensor networks
by Beyah, Raheem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2009Availability: Items available for loan: [Call number: 005.8 BEY] (1).
|
|
817.
|
Forensic discovery
by Venema, Wietse | Farmer, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 FAR] (1).
|
|
818.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|
|
819.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|
|
820.
|
Error correcting coding and security for data networks : analysis of the superchannel concept
by Kabatiansky, G | Krouk, E | Semenov, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 KAB] (1).
|