21. Building open source network security tools : components and techniques

by Schiffman, Mike D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
22. Managing IP Networks : challenges and opportunities

by Aidarous, Salah | Plevyak, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-IEEE Press, 2003Availability: Items available for loan: [Call number: 004.62 AID] (1).
23. Implementing SSH : strategies for optimizing the secure shell

by Dwivedi, Himanshu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
24. Networking approach to grid computing

by Minoli, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-Interscience, 2004Availability: Items available for loan: [Call number: 004.36 MIN] (1).
25. Business Data Communications and Networking

by Fitzgerald, Jerry | Dennis, Alan.

Edition: 9th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.6 FIT] (1).
26. Peter Norton's network security fundamentals

by Norton, Peter | Stockman, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
27. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
28. Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption

by Remy, David | Rosenberg, Jothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
29. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
30. Computer networking illuminated

by Barrett, Diane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 004.6 BAR] (1).
31. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
32. Technical guide to IPSec virtual private networks

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2000Availability: Items available for loan: [Call number: 005.8 TIL] (1).
33. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
34. Network security technologies

by Fung, Kwok T.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 FUN] (1).
35. Cyber security : turning national solutions into international cooperation

by Lewis, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Center for Strategic and International Studies, 2003Availability: Items available for loan: [Call number: 005.8 LEW] (1).
Tags:
36. Data, Network, and Internet Communications Technology

by Elahi, Ata | Elahi, Mehran.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Delmar Learning, 2006Availability: Items available for loan: [Call number: 004.6 ELA] (1).
37. Policy-Based Network Management : solutions for the next generation

by Strassner, John C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2003Availability: Items available for loan: [Call number: 004.6 STR] (1).
38. Internet and intranet security

by Oppliger, Rolf.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
39. Non-Repudiation in electronic commerce

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
40. Implementing security for ATM networks

by Tarman, Thomas D | Witzke, Edward L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 TAR] (1).

Powered by Koha