|
41.
|
iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.
by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
42.
|
Information security : theory and practice
by Patel, Dhiren R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
|
|
43.
|
Windows server 2008 : networking and network access protection (NAP)
by Davies, Joseph | Northrup, Tony | Microsoft Corporation. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 004.6844 DAV] (2).
|
|
44.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
45.
|
Network algorithmics : an interdisciplinary approach to designing fast networked devices
by Varghese, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 004.62 VAR] (1).
|
|
46.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
|
|
47.
|
Process of network security: Designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
48.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|
|
49.
|
Cloud Computing Design Patterns.
by Erl, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Prentice Hall 2015Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
|
|
50.
|
Guide to pairing-based cryptography
by El Mrabet, Nadia [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).
|
|
51.
|
Network programming with Go: Code secure and reliable network services from scratch
by Woodbeck, Adam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.133 WOO] (1).
|