21. Network Securitry Essentials

by Stallings, Willam | Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
22. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Harcourt, 2000Availability: Items available for loan: [Call number: 004.6 PET] (1).
23. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1998Availability: Items available for loan: [Call number: 005.8 STA] (6).
24. Networking : The complete reference

by Zacker, Craig.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.754 ZAC] (1).
25. Hacking exposed

by McClure, Stuart.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 MCC] (2).
26. Internet technologies at work

by Hofstetter, Fred T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 004.678 HOF] (1).
27. Hacking exposed VoIP : voice over IP security secrets and solutions

by Endler, David | Collier, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 END] (1).
28. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
29. Computer networks : an open source approach

by Hwang, Ren-Hung | Baker, Fred | Lin, Ying Dar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2012Availability: Items available for loan: [Call number: 004.6 LIN] (1).
30. Linux : the complete reference

by Peterson, Richard.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.74 PET] (6).
31. Computer and communication networks

by Mir, Nader F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2007Availability: Items available for loan: [Call number: 004.6 MIR] (1).
32. Networking Basics

by Ciccarelli, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 004.6 CIC] (1).
33. Implementing 802.1X security solutions for wired and wireless networks

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
34. Enterprise Security With EJB and CORBA

by Hartman, Bret.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
35. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
36. Maximum security

by Anonymous.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
37. 13th IEEE Computer Security Foundations Workshop

by Titsworth, Frances M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Computer Society, 2000Availability: Items available for loan: [Call number: 005.8 TIT] (1).
38. Identity and security : a common architecture & framework for SOA and network convergence

by Radhakrishnan, Rakesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Futuretext, 2007Availability: Items available for loan: [Call number: 621.382 RAD] (1).
39. Networking systems design and development

by Chao, Lee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 004.6 CHA] (1).
40. Guide to computer network security

by Kizza, Joseph Migga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).

Powered by Koha