|
361.
|
Principles of Information security
by Whitman, Michael E | Mattord, Herbert J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
362.
|
Protecting your PC
by Barile, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
|
|
363.
|
Guide to operating systems security
by Palmer, Michael J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 PAL] (1).
|
|
364.
|
Developing secure software
by Grembi, Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2008Availability: Items available for loan: [Call number: 005.8 GRE] (1).
|
|
365.
|
Network infrastructure security
by Weaver, Randy | Weaver, Dawn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
|
|
366.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
367.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
368.
|
Information security : a practical approach
by Bhaskar, S. M | Ahson, S. I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
|
|
369.
|
Code hacking : a developer's guide to network security
by Cordingley, Julian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
370.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
371.
|
Network security : issues, challenges and techniques
by Bhattacharyya, Dhruba K | Sarma, Nityananda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
|
|
372.
|
Applications of data mining in computer security
by Barbara, Daniel | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
|
|
373.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for reference: [Call number: 005.82 STA] (2).
|
|
374.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
375.
|
Security in distributed and networking systems
by Xiao, Yang | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 005.8 XIA] (1).
|
|
376.
|
Advances in artificial intelligence for privacy protection and security
by Solanas, Agusti | Mart�nez-Balleste, Antoni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2010Availability: Items available for loan: [Call number: 005.8 SOL] (1).
|
|
377.
|
Proceedings of the first international workshop on coding and cryptology
by Li, Yongqing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
|
|
378.
|
Forensic discovery
by Venema, Wietse | Farmer, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 FAR] (1).
|
|
379.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|
|
380.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|