241. Code hacking : a developer's guide to network security

by Cordingley, Julian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
242. Snort cookbook

by Orebaugh, Angela | Babbin, Jacob | Biles, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
243. SOA security

by Kanneganti, Ramarao.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2008Availability: Items available for loan: [Call number: 005.8 KAN] (1).
244. SSH, the secure shell : the definitive guide

by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
245. Beautiful security : leading security experts explain how they think

by Oram, Andy | Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Beijing: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 ORA] (1).
246. Cloud security and privacy : an enterprise perspective on risks and compliance

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Shroff Publishers, 2009Availability: Items available for loan: [Call number: 005.8 MAT] (1).
247. Network security : issues, challenges and techniques

by Bhattacharyya, Dhruba K | Sarma, Nityananda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
248. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
249. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
250. Trust and security in collaborative computing

by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
251. Security in AD-HOC and sensor networks

by Beyah, Raheem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2009Availability: Items available for loan: [Call number: 005.8 BEY] (1).
252. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
253. Error correcting coding and security for data networks : analysis of the superchannel concept

by Kabatiansky, G | Krouk, E | Semenov, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 KAB] (1).
254. Web security sourcebook : a complete guide to web security threats and solutions

by Geer, Daniel | Ranum, Marcus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1997Availability: Items available for loan: [Call number: 005.8 RUB] (1).
255. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
256. Information security illuminated

by Chapple, Mike | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
257. Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers

by Dingledine, Roger | Syverson, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
258. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
259. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
260. Hacking Web services

by Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).

Powered by Koha