|
21.
|
Network Securitry Essentials
by Stallings, Willam | Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
22.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Harcourt, 2000Availability: Items available for loan: [Call number: 004.6 PET] (1).
|
|
23.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1998Availability: Items available for loan: [Call number: 005.8 STA] (6).
|
|
24.
|
Networking : The complete reference
by Zacker, Craig. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.754 ZAC] (1).
|
|
25.
|
Hacking exposed
by McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 MCC] (2).
|
|
26.
|
Internet technologies at work
by Hofstetter, Fred T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 004.678 HOF] (1).
|
|
27.
|
Hacking exposed VoIP : voice over IP security secrets and solutions
by Endler, David | Collier, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
28.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
29.
|
Computer networks : an open source approach
by Hwang, Ren-Hung | Baker, Fred | Lin, Ying Dar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2012Availability: Items available for loan: [Call number: 004.6 LIN] (1).
|
|
30.
|
Linux : the complete reference
by Peterson, Richard. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.74 PET] (6).
|
|
31.
|
Computer and communication networks
by Mir, Nader F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2007Availability: Items available for loan: [Call number: 004.6 MIR] (1).
|
|
32.
|
Networking Basics
by Ciccarelli, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 004.6 CIC] (1).
|
|
33.
|
Implementing 802.1X security solutions for wired and wireless networks
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
|
|
34.
|
Enterprise Security With EJB and CORBA
by Hartman, Bret. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
35.
|
Network security : current status and future directions
by Serpanos, Dimitrios N | Douligeris, Christos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
|
|
36.
|
Maximum security
by Anonymous. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
|
|
37.
|
13th IEEE Computer Security Foundations Workshop
by Titsworth, Frances M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
|
|
38.
|
Identity and security : a common architecture & framework for SOA and network convergence
by Radhakrishnan, Rakesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Futuretext, 2007Availability: Items available for loan: [Call number: 621.382 RAD] (1).
|
|
39.
|
Networking systems design and development
by Chao, Lee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 004.6 CHA] (1).
|
|
40.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|