|
781.
|
Mark Stamp's information security : principles and practice
by Shah, Deven N | Stamp, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 SHA] (5).
|
|
782.
|
Cyber security: understanding cyber crimes, computer forensics and legal perspectives
by Godbole, Nina S | Belapure, Sunit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2011Availability: Items available for loan: [Call number: 005.8 GOD] (2).
|
|
783.
|
Network security : a practical approach
by Harrington, Jan L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Morgan Kaufmann, 2006Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
784.
|
VoIP security
by Ransome, James F | Rittinghouse, John W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 005.8 RAN] (1).
|
|
785.
|
Network algorithmics : an interdisciplinary approach to designing fast networked devices
by Varghese, George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2006Availability: Items available for loan: [Call number: 004.62 VAR] (1).
|
|
786.
|
Botnets : the killer web app
by Schiller, Craig A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
787.
|
How to cheat at configuring Open Source security tools
by Alder, Raven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 ALD] (1).
|
|
788.
|
Microsoft Vista for IT security professionals
by Piltzecker, Anthony | Chaffin, Larry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CHA] (2).
|
|
789.
|
Principles of Information security
by Whitman, Michael E | Mattord, Herbert J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
790.
|
Protecting your PC
by Barile, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
|
|
791.
|
Guide to operating systems security
by Palmer, Michael J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Course Technology, 2007Availability: Items available for loan: [Call number: 005.8 PAL] (1).
|
|
792.
|
Developing secure software
by Grembi, Jason. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2008Availability: Items available for loan: [Call number: 005.8 GRE] (1).
|
|
793.
|
Network infrastructure security
by Weaver, Randy | Weaver, Dawn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
|
|
794.
|
Ad Hoc wireless networks : architectures and protocols
by Murthy, C. Siva Ram | Manoj, B. S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 004.65 MUR] (6).
|
|
795.
|
Public-key cryptography : theory and practice
by Das, Abhijit | Madhavan, C. E. Veni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
|
|
796.
|
Distributed systems : concepts and design
by Coulouris, George F | Dollimore, Jean | Kindberg, Tim. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 004.36 COU] (1).
|
|
797.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
798.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
799.
|
Information security : a practical approach
by Bhaskar, S. M | Ahson, S. I. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
|
|
800.
|
Code hacking : a developer's guide to network security
by Cordingley, Julian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
|