521. Road to Serfdom

by Hayek, F. A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Routledge, 1994Availability: Items available for loan: [Call number: 320 HAY] (1).
522. India's national security : annual review 2011

by Kumar, Satish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Routledge, 2012Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
523. India's national security : annual review 2009

by Kumar, Satish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Routledge, 2010Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
524. Social income and insecurity

by Standing, Guy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Routledge India, 2010Availability: Items available for loan: [Call number: 368.400954 STA] (1).
525. India?s national security : annual review 2010

by Kumar, Satish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Routledge, 2010Availability: Items available for loan: [Call number: 355.033054 KUM] (1).
526. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
527. Elsevier's dictionary of information security in English, German, French and Russian

by Radichkova, B | Manoilov, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8033 MAN] (1).
528. Man from Pakistan : the true story of the world's most dangerous nuclear smuggler

by Frantz, Douglas | Collins, Catherine.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Twelve, 2008Availability: Items available for loan: [Call number: 623.45119092 FRA] (1).
529. Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence

by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
530. Security in wireless ad hoc and sensor networks

by Cayirci, Erdal | Rong, Chunming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 CAY] (1).
531. Policy-driven mobile ad hoc network management

by Chadha, Ritu | Kant, Lahta.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
532. Trust, complexity and control confidence in a convergent world

by Cofta, Piotr.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 COF] (1).
533. Windows vista security : securing vista against malicious attacks

by Grimes, Roger A | Johansson, Jesper M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
534. Network security fundamentals

by Reese, Rachelle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 REE] (1).
535. Networking Basics

by Ciccarelli, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2008Availability: Items available for loan: [Call number: 004.6 CIC] (1).
536. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
537. Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise

by Hoffman, Daniel V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
538. Implementing 802.1X security solutions for wired and wireless networks

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).
539. Web application hacker?s handbook : discovering and exploiting security flaws

by Stuttard, Dafydd.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
540. Security of information and communication networks

by Kartalopoulos, Stamatios V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 005.82 KAR] (1).

Powered by Koha