41. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
42. iNetSec 2009 - open research problems in network security : IFIP wg 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers.

by Camenisch, Jan | Camenisch, Jan | Dogan, Kesdogan | Kesdogan, Dogan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 CAM] (1).
43. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
44. Windows server 2008 : networking and network access protection (NAP)

by Davies, Joseph | Northrup, Tony | Microsoft Corporation.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 004.6844 DAV] (2).
45. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
46. Network algorithmics : an interdisciplinary approach to designing fast networked devices

by Varghese, George.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 004.62 VAR] (1).
47. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
48. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
49. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
50. Tutorial on wireless LAN (Wi-Fi) security

by Yu, James T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 621.319 YU,] (1).
51. Cloud Computing Design Patterns.

by Erl, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Prentice Hall 2015Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
52. Guide to pairing-based cryptography

by El Mrabet, Nadia [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).
53. Network programming with Go: Code secure and reliable network services from scratch

by Woodbeck, Adam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.133 WOO] (1).

Powered by Koha