|
201.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
202.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
203.
|
Information security : a practical approach
by Bhaskar, S. M | Ahson, S. I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
|
|
204.
|
Code hacking : a developer's guide to network security
by Cordingley, Julian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
205.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
206.
|
SOA security
by Kanneganti, Ramarao. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2008Availability: Items available for loan: [Call number: 005.8 KAN] (1).
|
|
207.
|
SSH, the secure shell : the definitive guide
by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
208.
|
Beautiful security : leading security experts explain how they think
by Oram, Andy | Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Beijing: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 ORA] (1).
|
|
209.
|
Cloud security and privacy : an enterprise perspective on risks and compliance
by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Shroff Publishers, 2009Availability: Items available for loan: [Call number: 005.8 MAT] (1).
|
|
210.
|
Network security : issues, challenges and techniques
by Bhattacharyya, Dhruba K | Sarma, Nityananda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
|
|
211.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for reference: [Call number: 005.82 STA] (2).
|
|
212.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
213.
|
Security in AD-HOC and sensor networks
by Beyah, Raheem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2009Availability: Items available for loan: [Call number: 005.8 BEY] (1).
|
|
214.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|
|
215.
|
Error correcting coding and security for data networks : analysis of the superchannel concept
by Kabatiansky, G | Krouk, E | Semenov, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 KAB] (1).
|
|
216.
|
Web security sourcebook : a complete guide to web security threats and solutions
by Geer, Daniel | Ranum, Marcus J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
|
|
217.
|
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by Raina, Kapil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
|
|
218.
|
Information security illuminated
by Chapple, Mike | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
219.
|
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
by Dingledine, Roger | Syverson, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
|
|
220.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|