61. Security for telecommunications network management

by Rozenblit, Moshe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 621.382 ROZ] (1).
62. Data and Computer Communications

by Stallings, William.

Edition: 7th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 004.6 STA] (1).
63. Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant

by Ballard, Jason | Ratliff, Bud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
64. Improving web application security : threats and countermeasures

by Microsoft Corporation | Mackman, Alex | Meier, J. D | Vasireddy, Srinath.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.8 MIC] (1).
65. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.803 TUL] (1).
66. Data Communications and Computer Networks

by Singh, Brijendra.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2006Availability: Items available for loan: [Call number: 004.6 SIN] (1).
67. Network security bible

by Cole, Eric | Conley, James W | Krutz, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
68. Corporate computer and network security

by Panko, Raymond R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
69. IPSec : the new security standard for the Internet, intranets, and virtual private networks2nd ed.

by Harkins, Dan.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.821 DOR] (1).
70. Biometrics for network security

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
71. Network security hacks : hundred industrial strength tips and tools

by Lockhart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
72. Web privacy with P3P

by Cranor, Lorrie Faith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 CRA] (1).
73. 802.11 security

by Potter, Bruce | Fleck, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
74. Hacking : the art of exploitation

by Erickson, Jon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2003Availability: No items available Checked out (1).
75. Managing security with snort and IDS tools

by Cox, Kerry | Gerg, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
76. Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort

by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
77. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
78. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
79. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
80. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (2).

Powered by Koha