41. iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.

by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
42. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
43. Windows server 2008 : networking and network access protection (NAP)

by Davies, Joseph | Northrup, Tony | Microsoft Corporation.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 004.6844 DAV] (2).
44. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
45. Network algorithmics : an interdisciplinary approach to designing fast networked devices

by Varghese, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 004.62 VAR] (1).
46. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
47. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
48. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
49. Cloud Computing Design Patterns.

by Erl, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Prentice Hall 2015Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
50. Guide to pairing-based cryptography

by El Mrabet, Nadia [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).
51. Network programming with Go: Code secure and reliable network services from scratch

by Woodbeck, Adam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.133 WOO] (1).

Powered by Koha