|
21.
|
Practical Unix and internet security
by Garfinkel, Simson. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 GAR] (2).
|
|
22.
|
'o' level made simple module 3 : internet and web design
by Jain, Shashank | Jain, Satish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: BPB Publications, 2003Availability: Items available for loan: [Call number: 004.678 JAI] (1).
|
|
23.
|
Internet security protocols : protecting IP traffic
by Black, Uyless. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2000Availability: Items available for loan: [Call number: 004.678 BLA] (1).
|
|
24.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
25.
|
TCP/IP protocol suite
by Forouzan, Behrouz A. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 004.62 FOR] (1).
|
|
26.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
27.
|
Electronic commerce : security, risk management and control
by Greenstein, Marilyn | Feinman, Todd M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
|
|
28.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
29.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
30.
|
Synchronizing Internet Protocol Security (SIPSec)
by Shoniregun, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 SHO] (1).
|
|
31.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
32.
|
Web application hacker?s handbook : discovering and exploiting security flaws
by Stuttard, Dafydd. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
|
|
33.
|
Cellular authentication for mobile and internet services
by Holtmanns, Silke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 HOL] (1).
|
|
34.
|
Host Identity Protocol (HIP) : towards the secure mobile Internet
by Gurtov, Andrei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 GUR] (1).
|
|
35.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|
|
36.
|
Wireless Internet security : architecture and protocols
by Kempf, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 KEM] (1).
|
|
37.
|
Internet security : hacking, counterhacking, and society
by Himma, Kenneth Einar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
|
|
38.
|
Wireless Internet Handbook : technologies, standards, and applications
by Furht, Borko | Ilyas, Mohammad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 004.678 FUR] (1).
|
|
39.
|
Data Communications and Networking
by Forouzan, Behrouz A. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: McGraw-Hill Education India, 2013Availability: Items available for loan: [Call number: 004.6 FOR] (2).
|
|
40.
|
Handbook of financial cryptography and security
by Rosenberg, Burton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
|