|
101.
|
Java 2 Network Security
by Pistoia, Marco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
102.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
103.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
104.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
105.
|
Threat modeling
by Swiderski, Frank | Snyder, Window. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
|
|
106.
|
Hunting security bugs
by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
107.
|
Multimedia fingerprinting forensics for traitor tracing
by Liu, K. J. Ray. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
|
|
108.
|
Hacking exposed Windows : windows security secrets & solutions
by Scambray, Joel | McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
|
|
109.
|
Firewalls : the complete reference
by Strassberg, Keith | Gondek, Richard | Rollie, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
|
|
110.
|
Network security : the complete reference
by Bragg, Roberta | Phodes-Ousley, Mark | Strassberg, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
111.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
112.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
113.
|
Mobile application security.
by Dwivedi, Himanshu | Clark, Chris | Thiel, David V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2010Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
114.
|
Cryptography and network security
by Forouzan, Behrouz A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
115.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
116.
|
Wi-Fi security
by Miller, Stewart S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
117.
|
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
|
|
118.
|
Broadband network & device security
by Lail, Benjamin M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.3821 LAI] (1).
|
|
119.
|
Digital signatures
by Atreya, Mohan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
|
|
120.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|