|
401.
|
Inside the Java virtual machine
by Venner, Bill. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.73 VEN] (5).
|
|
402.
|
Inside the Java virtual machine
by Venner, Bill. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.73 VEN] (1).
|
|
403.
|
Windows NT Security Handbook
by Sheldon, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 005.437 SHE] (1).
|
|
404.
|
SQL Server 7: The Complete Reference
by Coffman, Gayle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 COF] (1).
|
|
405.
|
SNMP network management
by Simoneau, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 004.678 SIM] (4).
|
|
406.
|
Internet Security Guidebook
by Ellis, Juanita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).
|
|
407.
|
Multimedia security technologies for digital rights management
by Zeng, Wenjun | Lin, Ching-Yung | Yu, Hong Heather. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Academic Press, 2006Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
408.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 PET] (1).
|
|
409.
|
Digital watermarking and steganography
by Cox, Ingemar J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
|
|
410.
|
Information assurance : dependability and security in networked systems
by Qian, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
|
|
411.
|
Computer and information security handbook
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
412.
|
Disappearing cryptography : information hiding, steganography and watermarking
by Wayner, Peter. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
|
|
413.
|
System assurance : beyond detecting vulnerabilities
by Mansourov, Nikolai | Campara, Djenana. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2011Availability: Items available for loan: [Call number: 005.8 MAN] (1).
|
|
414.
|
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
|
|
415.
|
Computer and information security handbook
by Vacca, John R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2013Availability: Items available for loan: [Call number: 005.8 VAC ] (1).
|
|
416.
|
Practical intrusion detection handbook
by Proctor, Paul E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
417.
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by Baum, Michael S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
|
|
418.
|
Developing EJB 2.0 Components
by Tulachan, Pravin V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall of India, 2002Availability: Items available for loan: [Call number: 005.73 TUL] (1).
|
|
419.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
420.
|
Applied algebra: Codes, ciphers and discrete algorithms
by Hardy, Darel W | Walker, Carol L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
|