|
521.
|
Road to Serfdom
by Hayek, F. A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Routledge, 1994Availability: Items available for loan: [Call number: 320 HAY] (1).
|
|
522.
|
India's national security : annual review 2011
by Kumar, Satish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Routledge, 2012Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
|
|
523.
|
India's national security : annual review 2009
by Kumar, Satish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Routledge, 2010Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
|
|
524.
|
Social income and insecurity
by Standing, Guy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Routledge India, 2010Availability: Items available for loan: [Call number: 368.400954 STA] (1).
|
|
525.
|
India?s national security : annual review 2010
by Kumar, Satish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Routledge, 2010Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
|
|
526.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
527.
|
Elsevier's dictionary of information security in English, German, French and Russian
by Radichkova, B | Manoilov, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
|
|
528.
|
Man from Pakistan : the true story of the world's most dangerous nuclear smuggler
by Frantz, Douglas | Collins, Catherine. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Twelve, 2008Availability: Items available for loan: [Call number: 623.45119092 FRA] (1).
|
|
529.
|
Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
|
|
530.
|
Security in wireless ad hoc and sensor networks
by Cayirci, Erdal | Rong, Chunming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
|
|
531.
|
Policy-driven mobile ad hoc network management
by Chadha, Ritu | Kant, Lahta. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
532.
|
Trust, complexity and control confidence in a convergent world
by Cofta, Piotr. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 COF] (1).
|
|
533.
|
Windows vista security : securing vista against malicious attacks
by Grimes, Roger A | Johansson, Jesper M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
534.
|
Network security fundamentals
by Reese, Rachelle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
|
|
535.
|
Networking Basics
by Ciccarelli, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 004.6 CIC] (1).
|
|
536.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
537.
|
Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise
by Hoffman, Daniel V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
|
|
538.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|
|
539.
|
Web application hacker?s handbook : discovering and exploiting security flaws
by Stuttard, Dafydd. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
|
|
540.
|
Security of information and communication networks
by Kartalopoulos, Stamatios V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).
|