361. Information assurance for the enterprise : a roadmap to information security

by Schou, Corey | Shoemaker, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
362. Hacking exposed VoIP : voice over IP security secrets and solutions

by Endler, David | Collier, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 END] (1).
363. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
364. Hacking exposed wireless : wireless security secrets & solutions

by Cache, Johnny | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
365. Mobile application security.

by Dwivedi, Himanshu | Clark, Chris | Thiel, David V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2010Availability: Items available for loan: [Call number: 005.8 DWI] (1).
366. Principles of computer security : security+ and beyond

by White, Gregory B | Cothren, Chuck | Williams, Dwayne.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
367. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
368. Computer networks : an open source approach

by Hwang, Ren-Hung | Baker, Fred | Lin, Ying Dar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2012Availability: Items available for loan: [Call number: 004.6 LIN] (1).
369. Wireless Security: Models, Threats and Solutions

by Nichols, Randall K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 NIC] (1).
370. Build Your Own Wireless LAN with Projects

by Trulove, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 TRU] (1).
371. 802.11 Demystified

by Larocca, James | Larocca, Ruth.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.319 LAR] (1).
372. Building VPNs with IPSec and MPLS

by Tan, Nam-Kee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
373. Wi-Fi security

by Miller, Stewart S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 MIL] (1).
374. Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions

by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
375. SQL from the Ground Up

by Pyefinch, Mary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 PYE] (1).
376. IT professional's guide to managing systems

by Plotnick, Neil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 004 PLO ] (1).
377. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
378. Windows 2000: DNS server

by Wong, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.437 WON] (1).
379. Windows 2000: security handbook

by Cox, Philip | Sheldon, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.437 COX] (1).
380. Linux : the complete reference

by Peterson, Richard.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.74 PET] (6).

Powered by Koha