41. Advanced concepts in operating systems : distributed, database, and multiprocessor operating systems

by Singhal, Mukesh | Shivaratri, Niranjan G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.43 SIN] (3).
42. Software forensics : collecting evidence from the scene of a digital crime

by Slade, Robert M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
43. Information assurance for the enterprise : a roadmap to information security

by Schou, Corey | Shoemaker, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
44. Troubleshooting, maintaining and repairing PCs

by Bigelow, Stephen J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 621.39160288 BIG] (8).
45. Computer security lab manual

by Nestler, Vincent J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
46. Hacking exposed Cisco networks : Cisco security secrets & solutions

by Vladimirov, Andrew A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
47. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
48. Computer security : 20 things every employee should know

by Rothke, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
49. Digital watermarking and steganography

by Cox, Ingemar J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
50. Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

by Skoudis, Ed | Liston, Tom.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
51. Analyzing computer security : a threat/vulnerability/countermeasure approach

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
52. Software IP detective's handbook : measurement, comparison, and infringement detection

by Zeidman, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 346.048 ZEI] (1).
53. Modern VLSI design : IP-based design

by Wolf, Wayne.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2009Availability: Items available for loan: [Call number: 621.395 WOL] (1).
54. Convenient action : Gujarat's response to challenges of climate change

by Modi, Narendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: MacMillan, 2011Availability: Items available for loan: [Call number: 363.73874 MOD] (1).
55. Useless arithmetic : why environmental scientists can?t predict the future

by Pilkey, Orrin H | Pilkey-Jarvis, Linda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Columbia University Press, 2006Availability: Items available for loan: [Call number: 363.705 PIL] (1).
56. Securing VoIP networks : threats, vulnerabilities, and countermeasures

by Thermos, Peter | Takanen, Ari.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.695 THE] (1).
57. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
58. Control of nature

by McPhee, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Farrar, Straus and Giroux, 1990Availability: Items available for loan: [Call number: 304.2 MCP] (1).
59. Trust Management II : proceedings of IFIPTM 2008 : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

by Karabulut, Yucel | Herrmann, Peter | Jensen, Christian Damsgaard | Mitchell, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005 KAR] (1).
60. Identifying malicious code through reverse engineering

by Singh, Baibhav | Singh, Abhishek.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).

Powered by Koha