41. Cryptography in the database : the last line of defense

by Kenan, Kevin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
42. Practical Unix and Internet security

by Garfinkel, Simson.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 1996Availability: Items available for loan: [Call number: 005.8 GAR] (1).
43. Java Examples in a Nutshell

by Flanagan, David.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 005.73 FLA] (1).
44. C# web services : building web services with .NET remoting and ASP.NET

by Banerjee, Ashish and Others.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.276 BAN] (1).
45. Web Security, Privacy and Commerce

by Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
46. Java security

by Oaks, Scott.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2001Availability: Items available for loan: [Call number: 005.73 OAK] (1).
47. Cryptography in C and C++

by Welschenbach, Michael | Kramer, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
48. Designing Systems for Internet Commerce

by Treese, G. Winfield | Stewart, Lawrence C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 658.8002854678 TRE] (1).
49. Network Securitry Essentials

by Stallings, Willam | Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
50. Internet Cryptography

by Smith, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
51. Basics of contemporary cryptography for IT practitioners

by Ryabko, Boris | Fionov, Andrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
52. IPSec: securing VPNs

by Davis, Carlton R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
53. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
54. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
55. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
56. Electronic commerce : security, risk management and control

by Greenstein, Marilyn | Feinman, Todd M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
57. Internet Security Guidebook

by Ellis, Juanita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).
58. Disappearing cryptography : information hiding, steganography and watermarking

by Wayner, Peter.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
59. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
60. NET security and cryptography

by Thorsteinson, Peter | Ganesh, G. Gnana Arun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).

Powered by Koha