|
221.
|
Data and Computer Communications
by Stallings, William. Edition: 7th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 004.6 STA] (1).
|
|
222.
|
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by Ballard, Jason | Ratliff, Bud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
223.
|
Improving web application security : threats and countermeasures
by Microsoft Corporation | Mackman, Alex | Meier, J. D | Vasireddy, Srinath. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.8 MIC] (1).
|
|
224.
|
Microsoft encyclopedia of security
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.803 TUL] (1).
|
|
225.
|
Digital signature : network security practices
by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
226.
|
WebSphere application server V5 : system administration
by International Business Machines Corporation. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.1 INT] (1).
|
|
227.
|
Data Communications and Computer Networks
by Singh, Brijendra. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2006Availability: Items available for loan: [Call number: 004.6 SIN] (1).
|
|
228.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
229.
|
Oracle 8 Bible
by McCullough-Dieter, Carol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: IDG Books Worldwide, 2000Availability: Items available for loan: [Call number: 005.74 MCC] (4).
|
|
230.
|
Designing security architecture solutions
by Ramachandran, Jay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
|
|
231.
|
Red Hat Linux Networking and System Administration
by Collings, Terry | Wall, Kurt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2002Availability: Items available for loan: [Call number: 005.754 COL] (2).
|
|
232.
|
Mastering Java security : cryptography algorithms and architecture
by Helton, Rich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.73 HEL] (1).
|
|
233.
|
Hack attacks revealed : a complete reference for Unix, Windows, and Linux with custom security toolkit
by Chirillo, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-dreamtech India, 2002Availability: Items available for loan: [Call number: 005.821 CHI] (2).
|
|
234.
|
Network Security For Windows
by Chirillo, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CHI] (2).
|
|
235.
|
Security engineering : a guide to building dependable distributed systems
by Anderson, Ross J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 AND] (1).
|
|
236.
|
Practical cryptography
by Schneier, Bruce | Ferguson, Niels. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
237.
|
Network security bible
by Cole, Eric | Conley, James W | Krutz, Ronald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
238.
|
Computer security
by Gollmann, Dieter. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 GOL] (1).
|
|
239.
|
Corporate computer and network security
by Panko, Raymond R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
|
|
240.
|
Computer security : art and science
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (4).
|