Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 12 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
First
Previous
3
4
5
6
7
8
9
10
11
12
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
221.
Image from Google Jackets
Emerging challenges for security, privacy and trust
by
Gritzalis, Dimitris
Lopez, Javier
Series:
IFIP adances in information and communication technology
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GRI
.
Place hold
Save to lists
222.
Image from Google Jackets
Network Control and Engineering for QOS, Security and Mobility, III.
by
Gaiti, Dominique
Gaiti, Dominique
Galmes, Sebastia
Puigjaner, Ramon
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
004.6068 GAI
.
Place hold
Save to lists
223.
Image from Google Jackets
Future of identity in the information society
by
Fischer-Hubner, Simone
IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society
International Federation for Information Processing
Series:
International Federation for Information Processing
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 FIS
.
Place hold
Save to lists
224.
Image from Google Jackets
Non-Repudiation in electronic commerce
by
Zhou, Jianying
Series:
Artech House computer security series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ZHO
.
Place hold
Save to lists
225.
Image from Google Jackets
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by
Camenisch, Jan
Camenisch, Jan
Dogan, Kesdogan
Kesdogan, Dogan
Series:
IFIP adances in information and communication technology
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CAM
.
Place hold
Save to lists
226.
Image from Google Jackets
PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues
by
Raina, Kapil
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 RAI
.
Place hold
Save to lists
227.
Image from Google Jackets
Executive guide to information security : threats, challenges, and solutions
by
Egan, Mark
Mather, Tim
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Addison-Wesley,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 EGA
.
Place hold
Save to lists
228.
Image from Google Jackets
Schneier on security
by
Schneier, Bruce
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Wiley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.80973 SCH
.
Place hold
Save to lists
229.
Image from Google Jackets
Handbook of financial cryptography and security
by
Rosenberg, Burton
Series:
Chapman & Hall/CRC cryptography and network security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
332.178 ROS
.
Place hold
Save to lists
230.
Image from Google Jackets
Security and quality of service in ad hoc wireless networks
by
Mishra, Amitabh
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
Cambridge University Press,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
621.3821 MIS
.
Place hold
Save to lists
231.
Image from Google Jackets
Protocols for authentication and key establishment
by
Boyd, Colin
Mathuria, Anish
Series:
Information security and cryptography
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(2)
Call number:
005.82 BOY, ..
.
Place hold
Save to lists
232.
Image from Google Jackets
UMTS security
by
Niemi, Valtteri
Nyberg, Kaisa
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chichester:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(2)
Call number:
005.8 NIE, ..
.
Place hold
Save to lists
233.
Image from Google Jackets
Trust and privacy in digital business : first international conference, Trustbus 2004, Zaragoza, Spain, August 30 - September 1, 2004 ; proceedings
by
Katsikas, Sokratis
Lopez, Javier
Pernul, Gunther
Series:
; 3184
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
004 KAT
.
Place hold
Save to lists
234.
Image from Google Jackets
Cybersecurity and cyberwar : what everyone needs to know
by
Singer, P. W
Friedman, Allan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Oxford University Press,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SIN
.
Place hold
Save to lists
235.
Image from Google Jackets
Communications and Multimedia Security : Advanced Techniques for Network and Data Protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : Proceeding
by
Lioy, Antonio
Mazzocchi, Daniele
Series:
; 2828
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
004 LIO
.
Place hold
Save to lists
236.
Image from Google Jackets
Fuzzing for software security testing and quality assurance 2nd ed.
by
Takanen, Ari
DeMott, Jared
Miller, Charlie
Kettunen, Atte
Series:
Artech House information security and privacy series
Publication details:
Boston :
Artech House,
2018
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 TAK
.
Place hold
Save to lists
First
Previous
3
4
5
6
7
8
9
10
11
12
Not finding what you're looking for?
Make a
purchase suggestion