361. Principles of Information security

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 WHI] (1).
362. Protecting your PC

by Barile, Ian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
363. Guide to operating systems security

by Palmer, Michael J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 PAL] (1).
364. Developing secure software

by Grembi, Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Cengage Learning, 2008Availability: Items available for loan: [Call number: 005.8 GRE] (1).
365. Network infrastructure security

by Weaver, Randy | Weaver, Dawn.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
366. Computer security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
367. Network security essentials : applications and standards

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
368. Information security : a practical approach

by Bhaskar, S. M | Ahson, S. I.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
369. Code hacking : a developer's guide to network security

by Cordingley, Julian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
370. Snort cookbook

by Orebaugh, Angela | Babbin, Jacob | Biles, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
371. Network security : issues, challenges and techniques

by Bhattacharyya, Dhruba K | Sarma, Nityananda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
372. Applications of data mining in computer security

by Barbara, Daniel | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
373. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for reference: [Call number: 005.82 STA] (2).
374. Trust and security in collaborative computing

by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
375. Security in distributed and networking systems

by Xiao, Yang | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
376. Advances in artificial intelligence for privacy protection and security

by Solanas, Agusti | Mart�nez-Balleste, Antoni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
377. Proceedings of the first international workshop on coding and cryptology

by Li, Yongqing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
378. Forensic discovery

by Venema, Wietse | Farmer, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 FAR] (1).
379. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
380. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).

Powered by Koha