221. Schaum's outline of theory and problems of computer networking

by Tittel, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 004.6 TIT] (1).
222. How to do everything : Microsoft SharePoint 2010

by Cawood, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2010Availability: Items available for loan: [Call number: 005.5 CAW] (1).
223. Cisco router performance field guide

by Held, Gilbert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 004.62 HEL] (1).
224. Broadband network & device security

by Lail, Benjamin M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.3821 LAI] (1).
225. Biometrics : Identity assurance in the information age

by Woodward, John D | Higgins, Peter | Orlans, Nicholas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill Osborne Media, 2003Availability: Items available for loan: [Call number: 621.38928 WOO] (1).
226. Build Your Own Wi-Fi Network

by Brisbin, Shelly | Carty, Glen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 004.68 BRI] (1).
227. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
228. Hardening windows systems : bulletproof your systems before you are hacked

by Bragg, Roberta.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
229. Hacking exposed Cisco networks : Cisco security secrets & solutions

by Vladimirov, Andrew A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
230. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
231. Local Area Networks

by Keiser, Herd E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill, 1997Availability: Items available for loan: [Call number: 004.6 KEI] (1).
232. Data communications and network security

by Carr, Houston H | Snyder, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
233. Cisco Router OSPF

by Parkhurst, William R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 004.62 PAR] (1).
234. ICT infrastructure management

by Treasury, Office of Government Commerce, United Kingdom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Stationery Office Books, 2002Availability: Items available for loan: [Call number: 004.068 UNI] (1).
235. Multimedia over IP and wireless networks : compression, networking, and systems

by Chou, Philip A | Schaar, Mihaela van der.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 006.7 CHO] (1).
236. Network routing : algorithms, protocols, and architectures

by Medhi, Deepankar | Ramasamy, Karthikeyan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 MED] (2).
237. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 PET] (1).
238. Information assurance : dependability and security in networked systems

by Qian, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
239. Computer and information security handbook

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 VAC] (1).
240. Disappearing cryptography : information hiding, steganography and watermarking

by Wayner, Peter.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).

Powered by Koha