|
1.
|
ICMID-2010 : international conference on mobile internet devices
by Gokaraja Rangaraju Institute of Engineering and Technology. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bachupally: Gokaraja Rangaraju Institute of Engineering and Technology, 2010Availability: Items available for loan: [Call number: 004 GOK] (1).
|
|
2.
|
Hindu survey of Indian agriculture 2006
by Hindu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Kasturi & Sons Ltd, 2006Availability: Items available for loan: [Call number: 630.723954 HIN] (1).
|
|
3.
|
In search of economic alternatives for gender and social justice : voices from India
by Wichterich, Christa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Belgium: WIDE, 2010Availability: Items available for loan: [Call number: 303.372 WIC] (1).
|
|
4.
|
Quantum cryptography using coherent states : randomized encryption and key generation
by Corndorf, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
5.
|
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations
by Datta, Anupam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
|
|
6.
|
SQL Server 7: Administration
by Linsenbardt, Mark | Stigler, M. Shane. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.74 LIN] (1).
|
|
7.
|
Advances in computers : information security. Volume 60
by Zelkowitz, Marvin V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004 ZEL] (1).
|
|
8.
|
ASN.1 communication between heterogeneous systems
by Dubuisson, Olivier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
|
|
9.
|
Java 2 network security
by Pistoia, Marco. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
10.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
|
|
11.
|
Malware : fighting malicious code
by Skoudis, Ed | Zeltser, Lenny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
12.
|
How secure is your wireless network? : safeguarding your Wi-Fi-LAN
by Barken, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
13.
|
Core security patterns : best practices and strategies for J2EE, web services and identity management
by Steel, Christopher | Lai, Ray | Nagappan, Ramesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
14.
|
Internet denial of service : attack and defense mechanisms
by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
|
|
15.
|
Firewalls and VPNs : principles and practices
by Tibbs, Richard | Oakes, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
|
|
16.
|
Security in computing
by Pfleeger, Charles P. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
17.
|
Crypto : how the code rebels beat the government - saving privacy in the digital age
by Levy, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
|
|
18.
|
Computer, ethics, and society
by Ermann, M. David | Ermann, M. David | Shauf, Michele | Shauf, Michele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 303.4834 ERM] (1).
|
|
19.
|
Protecting critical infrastructures against cyber-attack
by Goodman, Seymour E | Longhurst,David W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
|
|
20.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|