|
41.
|
Cryptography in the database : the last line of defense
by Kenan, Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
|
|
42.
|
Practical Unix and Internet security
by Garfinkel, Simson. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 1996Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
43.
|
Java Examples in a Nutshell
by Flanagan, David. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2000Availability: Items available for loan: [Call number: 005.73 FLA] (1).
|
|
44.
|
C# web services : building web services with .NET remoting and ASP.NET
by Banerjee, Ashish and Others. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.276 BAN] (1).
|
|
45.
|
Web Security, Privacy and Commerce
by Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
|
|
46.
|
Java security
by Oaks, Scott. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2001Availability: Items available for loan: [Call number: 005.73 OAK] (1).
|
|
47.
|
Cryptography in C and C++
by Welschenbach, Michael | Kramer, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
|
|
48.
|
Designing Systems for Internet Commerce
by Treese, G. Winfield | Stewart, Lawrence C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 658.8002854678 TRE] (1).
|
|
49.
|
Network Securitry Essentials
by Stallings, Willam | Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
50.
|
Internet Cryptography
by Smith, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
|
|
51.
|
Basics of contemporary cryptography for IT practitioners
by Ryabko, Boris | Fionov, Andrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
|
|
52.
|
IPSec: securing VPNs
by Davis, Carlton R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
53.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
54.
|
Cryptography and network security
by Forouzan, Behrouz A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
55.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
56.
|
Electronic commerce : security, risk management and control
by Greenstein, Marilyn | Feinman, Todd M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
|
|
57.
|
Internet Security Guidebook
by Ellis, Juanita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).
|
|
58.
|
Disappearing cryptography : information hiding, steganography and watermarking
by Wayner, Peter. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
|
|
59.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
60.
|
NET security and cryptography
by Thorsteinson, Peter | Ganesh, G. Gnana Arun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
|