|
861.
|
Internet infrastructure security
by Chakrabarti, Anirban | Manimaran, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 621.3192 CHA] (1).
|
|
862.
|
Security and information assurance
by Malek, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2003Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
863.
|
Traffic analysis for network security
by Chen, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
864.
|
Tutorial on wireless LAN (Wi-Fi) security
by Yu, James T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 621.319 YU,] (1).
|
|
865.
|
Web security
by Chen, Thomas M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
866.
|
Understanding the digital world : what you need to know about computers, the internet, privacy, and security
by Kernighan, Brian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
|
|
867.
|
Basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice.
by Rountree, Derrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam Elsevier Science 2014Availability: Items available for loan: [Call number: 004.6782 ROU] (1).
|
|
868.
|
Bug hunter's diary : a guided tour through the wilds of software security.
by Klein, Tobias. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco No Starch Press 2011Availability: Items available for loan: [Call number: 005.8 KLE] (1).
|
|
869.
|
Cloud computing : concepts, technology & architecture
by Erl, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Prentice Hall 2013Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
|
|
870.
|
Cloud Computing Design Patterns.
by Erl, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Prentice Hall 2015Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
|
|
871.
|
First food : culture of taste
by narain, sunita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Centre For Science and Environment 2013Availability: Items available for loan: [Call number: 641.5954 NAR] (1).
|
|
872.
|
Artificial immune system : applications in computer security
by Tan, Ying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-IEEE Computer Society Press, 2016Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
873.
|
Fundamentals of IP and SoC security : design, verification, and debug
by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
|
|
874.
|
Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project
by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
|
|
875.
|
Secure data deletion
by Reardon, Joel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
|
|
876.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
877.
|
Driver's license
by Castile, Meredith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 929.9 CAS] (1).
|
|
878.
|
Mathematics of secrets : cryptography from caesar ciphers to digital encryption
by Holden, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
|
|
879.
|
Password
by Eve, Martin Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 005.8 EVE] (1).
|
|
880.
|
Visual cryptography and secret image sharing
by Climato, Stelvio | Yang, Ching-Nung. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Crc Press, 2011Availability: Items available for loan: [Call number: 005.82 CIM] (1).
|