321. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).
322. Imperial Encounters

by Veer, Peter Van Der.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Permanent Black, 2001Availability: Items available for loan: [Call number: 211.6 VEE] (1).
323. Designing Secure Web-Based Applications for Microsoft Windows 2000

by Howard, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: WP Publishers, 2000Availability: Items available for loan: [Call number: 005.437 HOW] (2).
324. Threat modeling

by Swiderski, Frank | Snyder, Window.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
325. Hunting security bugs

by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
326. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Harcourt, 2000Availability: Items available for loan: [Call number: 004.6 PET] (1).
327. SQL Unleashed

by Ladanyi, Hans.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Techmedia, 1997Availability: Items available for loan: [Call number: 005.74 LAD] (4).
328. Food security in nutrient-stressed environments : exploiting plants' genetic capabilities

by Adu-Gyamfi, J. J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Patancheru: International Crops Research Institute for the Semi-Arid Tropics, 1999Availability: Items available for loan: [Call number: 631.5233 ADU] (1).
329. Future challenges and opportunities for agricultural R & D in the Semi-Arid Tropics

by Ryan, J. G | Spencer, D. C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Patancheru: International Crops Research Institute for the Semi-Arid Tropics, 2001Availability: Items available for loan: [Call number: 330.3463 RYA] (1).
330. Multimedia fingerprinting forensics for traitor tracing

by Liu, K. J. Ray.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
331. Information Warfare and Security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
332. Internet Cryptography

by Smith, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
333. Distributed Systems : concepts and design

by Coulouris, George | Dollimore, Jean | Kindberg, Tim.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2000Availability: Items available for loan: [Call number: 004.3681 COU] (1).
334. Security+

by Calvert, Ben | Boswell, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
335. Basics of contemporary cryptography for IT practitioners

by Ryabko, Boris | Fionov, Andrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
336. ASP/MTS/ADSI, web security

by Harrison, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 HAR] (2).
337. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1998Availability: Items available for loan: [Call number: 005.8 STA] (6).
338. Cryptography For Visual Basic: A Programmer's Guide to the Microsoft CryptoAPI

by Bondi, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.82 BON] (2).
339. Safe : the race to protect ourselves in a newly dangerous world

by Baer, Martha | Heron, Katrina | Morton, Oliver | Ratliff, Evan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: HarperCollins, 2005Availability: Items available for loan: [Call number: 363.32 BAE] (1).
340. Hacking exposed Windows : windows security secrets & solutions

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).

Powered by Koha