221. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
222. Hacking Web services

by Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).
223. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
224. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
225. Hacker's handbook : the strategy behind breaking into and defending networks

by Susan Young | Aitel, Dav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
226. Policy-based network configuration management for MANETs

by Chadha, Ritu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
227. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
228. Web security

by Chen, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
229. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
230. Adaptive security management architecture

by Tiller, James S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 658.478 TIR] (1).
231. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
232. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
233. Enterprise level security 1 - 2 : advanced topics in an uncertain world

by Foltz, Kevin E | Simpson, William Randolph.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.8 FOL] (2).

Powered by Koha