|
361.
|
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey | Shoemaker, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
362.
|
Hacking exposed VoIP : voice over IP security secrets and solutions
by Endler, David | Collier, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
363.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
364.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
365.
|
Mobile application security.
by Dwivedi, Himanshu | Clark, Chris | Thiel, David V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2010Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
366.
|
Principles of computer security : security+ and beyond
by White, Gregory B | Cothren, Chuck | Williams, Dwayne. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
367.
|
Cryptography and network security
by Forouzan, Behrouz A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
368.
|
Computer networks : an open source approach
by Hwang, Ren-Hung | Baker, Fred | Lin, Ying Dar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2012Availability: Items available for loan: [Call number: 004.6 LIN] (1).
|
|
369.
|
Wireless Security: Models, Threats and Solutions
by Nichols, Randall K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 NIC] (1).
|
|
370.
|
Build Your Own Wireless LAN with Projects
by Trulove, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 TRU] (1).
|
|
371.
|
802.11 Demystified
by Larocca, James | Larocca, Ruth. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 LAR] (1).
|
|
372.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
373.
|
Wi-Fi security
by Miller, Stewart S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
374.
|
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
|
|
375.
|
SQL from the Ground Up
by Pyefinch, Mary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 PYE] (1).
|
|
376.
|
IT professional's guide to managing systems
by Plotnick, Neil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 004 PLO ] (1).
|
|
377.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
378.
|
Windows 2000: DNS server
by Wong, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.437 WON] (1).
|
|
379.
|
Windows 2000: security handbook
by Cox, Philip | Sheldon, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.437 COX] (1).
|
|
380.
|
Linux : the complete reference
by Peterson, Richard. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.74 PET] (6).
|