401. Inside the Java virtual machine

by Venner, Bill.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.73 VEN] (5).
402. Inside the Java virtual machine

by Venner, Bill.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.73 VEN] (1).
403. Windows NT Security Handbook

by Sheldon, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 005.437 SHE] (1).
404. SQL Server 7: The Complete Reference

by Coffman, Gayle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 COF] (1).
405. SNMP network management

by Simoneau, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 004.678 SIM] (4).
406. Internet Security Guidebook

by Ellis, Juanita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).
407. Multimedia security technologies for digital rights management

by Zeng, Wenjun | Lin, Ching-Yung | Yu, Hong Heather.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Academic Press, 2006Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
408. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 PET] (1).
409. Digital watermarking and steganography

by Cox, Ingemar J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
410. Information assurance : dependability and security in networked systems

by Qian, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
411. Computer and information security handbook

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 VAC] (1).
412. Disappearing cryptography : information hiding, steganography and watermarking

by Wayner, Peter.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
413. System assurance : beyond detecting vulnerabilities

by Mansourov, Nikolai | Campara, Djenana.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2011Availability: Items available for loan: [Call number: 005.8 MAN] (1).
414. Cyber attacks : protecting national infrastructure

by Amoroso, Edward G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
415. Computer and information security handbook

by Vacca, John R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2013Availability: Items available for loan: [Call number: 005.8 VAC ] (1).
416. Practical intrusion detection handbook

by Proctor, Paul E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
417. Secure electronic commerce : building the infrastructure for digital signatures and encryption

by Baum, Michael S.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
418. Developing EJB 2.0 Components

by Tulachan, Pravin V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall of India, 2002Availability: Items available for loan: [Call number: 005.73 TUL] (1).
419. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
420. Applied algebra: Codes, ciphers and discrete algorithms

by Hardy, Darel W | Walker, Carol L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).

Powered by Koha