|
321.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
322.
|
Imperial Encounters
by Veer, Peter Van Der. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Permanent Black, 2001Availability: Items available for loan: [Call number: 211.6 VEE] (1).
|
|
323.
|
Designing Secure Web-Based Applications for Microsoft Windows 2000
by Howard, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: WP Publishers, 2000Availability: Items available for loan: [Call number: 005.437 HOW] (2).
|
|
324.
|
Threat modeling
by Swiderski, Frank | Snyder, Window. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
|
|
325.
|
Hunting security bugs
by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
326.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Harcourt, 2000Availability: Items available for loan: [Call number: 004.6 PET] (1).
|
|
327.
|
SQL Unleashed
by Ladanyi, Hans. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Techmedia, 1997Availability: Items available for loan: [Call number: 005.74 LAD] (4).
|
|
328.
|
Food security in nutrient-stressed environments : exploiting plants' genetic capabilities
by Adu-Gyamfi, J. J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Patancheru: International Crops Research Institute for the Semi-Arid Tropics, 1999Availability: Items available for loan: [Call number: 631.5233 ADU] (1).
|
|
329.
|
Future challenges and opportunities for agricultural R & D in the Semi-Arid Tropics
by Ryan, J. G | Spencer, D. C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Patancheru: International Crops Research Institute for the Semi-Arid Tropics, 2001Availability: Items available for loan: [Call number: 330.3463 RYA] (1).
|
|
330.
|
Multimedia fingerprinting forensics for traitor tracing
by Liu, K. J. Ray. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
|
|
331.
|
Information Warfare and Security
by Denning, Dorothy E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
332.
|
Internet Cryptography
by Smith, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
|
|
333.
|
Distributed Systems : concepts and design
by Coulouris, George | Dollimore, Jean | Kindberg, Tim. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2000Availability: Items available for loan: [Call number: 004.3681 COU] (1).
|
|
334.
|
Security+
by Calvert, Ben | Boswell, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
335.
|
Basics of contemporary cryptography for IT practitioners
by Ryabko, Boris | Fionov, Andrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
|
|
336.
|
ASP/MTS/ADSI, web security
by Harrison, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 HAR] (2).
|
|
337.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1998Availability: Items available for loan: [Call number: 005.8 STA] (6).
|
|
338.
|
Cryptography For Visual Basic: A Programmer's Guide to the Microsoft CryptoAPI
by Bondi, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.82 BON] (2).
|
|
339.
|
Safe : the race to protect ourselves in a newly dangerous world
by Baer, Martha | Heron, Katrina | Morton, Oliver | Ratliff, Evan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: HarperCollins, 2005Availability: Items available for loan: [Call number: 363.32 BAE] (1).
|
|
340.
|
Hacking exposed Windows : windows security secrets & solutions
by Scambray, Joel | McClure, Stuart. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
|