21. Practical Unix and internet security

by Garfinkel, Simson.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 GAR] (2).
22. 'o' level made simple module 3 : internet and web design

by Jain, Shashank | Jain, Satish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: BPB Publications, 2003Availability: Items available for loan: [Call number: 004.678 JAI] (1).
23. Internet security protocols : protecting IP traffic

by Black, Uyless.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2000Availability: Items available for loan: [Call number: 004.678 BLA] (1).
24. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
25. TCP/IP protocol suite

by Forouzan, Behrouz A.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 004.62 FOR] (1).
26. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
27. Electronic commerce : security, risk management and control

by Greenstein, Marilyn | Feinman, Todd M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
28. Trust and risk in Internet commerce

by Camp, L. Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
29. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
30. Synchronizing Internet Protocol Security (SIPSec)

by Shoniregun, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 SHO] (1).
31. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
32. Web application hacker?s handbook : discovering and exploiting security flaws

by Stuttard, Dafydd.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
33. Cellular authentication for mobile and internet services

by Holtmanns, Silke.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 HOL] (1).
34. Host Identity Protocol (HIP) : towards the secure mobile Internet

by Gurtov, Andrei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 GUR] (1).
35. E-commerce security : weak links, best defenses

by Ghosh, Anup K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
36. Wireless Internet security : architecture and protocols

by Kempf, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
37. Internet security : hacking, counterhacking, and society

by Himma, Kenneth Einar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
38. Wireless Internet Handbook : technologies, standards, and applications

by Furht, Borko | Ilyas, Mohammad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 004.678 FUR] (1).
39. Data Communications and Networking

by Forouzan, Behrouz A.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill Education India, 2013Availability: Items available for loan: [Call number: 004.6 FOR] (2).
40. Handbook of financial cryptography and security

by Rosenberg, Burton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).

Powered by Koha