|
1.
|
Building open source network security tools : components and techniques
by Schiffman, Mike D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
2.
|
Wireless security essentials : defending mobile systems from data piracy
by Vines, Russell Dean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
|
|
3.
|
Ajax for dummies
by Holzner, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 005.133 HOL] (1).
|
|
4.
|
Programming for embedded systems : cracking the code
by Dreamtech Software Team. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.26 DRE] (4).
|
|
5.
|
Mastering Java security : cryptography algorithms and architecture
by Helton, Rich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.73 HEL] (1).
|
|
6.
|
Cryptography for Database and Internet Applications
by Galbreath, Nick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
|
|
7.
|
Network Security For Windows
by Chirillo, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CHI] (2).
|
|
8.
|
PHP bible
by Converse, Tim | Park, Joyce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.2762 CON] (4).
|
|
9.
|
Official Red Hat Linux Administrators Guide
by Hat, Red. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.74 HAT] (2).
|
|
10.
|
Professional assembly language
by Blum, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2005Availability: Items available for loan: [Call number: 005.136 BLU] (1).
|
|
11.
|
Nanotechnology
by Booker, Richard | Boysen, Earl. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2005Availability: Items available for loan: [Call number: 620.5 BOO] (1).
|
|
12.
|
Art of deception : controlling the human element of security
by Simon, William L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
13.
|
Beginning C# 2005 databases
by Watson, Karli. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 005.133 WAT] (1).
|
|
14.
|
Service Oriented Architecture for Dummies
by Hurwitz, Judith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 004.65 HUR] (1).
|
|
15.
|
Introducing 3ds Max 9 : 3D for beginners
by Derakhshani, Dariush | McFarland, Jon | Munn, Randi L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 006.696 DER] (2).
|
|
16.
|
Windows vista security : securing vista against malicious attacks
by Grimes, Roger A | Johansson, Jesper M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
17.
|
Ajax bible
by Holzner, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 006.78 HOL] (1).
|
|
18.
|
Group policy : management, troubleshooting, and security
by Moskowitz, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.446 MOS] (1).
|
|
19.
|
Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise
by Hoffman, Daniel V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
|
|
20.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|