81. Threat modeling

by Swiderski, Frank | Snyder, Window.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
82. Hunting security bugs

by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
83. Hacking exposed Windows : windows security secrets & solutions

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
84. Communication Networks

by Leon-Garcia, Alberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 621.3821 LEO] (1).
85. Communication Networks : a first course

by Walrand, Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
86. Firewalls : the complete reference

by Strassberg, Keith | Gondek, Richard | Rollie, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
87. Network security : the complete reference

by Bragg, Roberta | Phodes-Ousley, Mark | Strassberg, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
88. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
89. Hacking exposed wireless : wireless security secrets & solutions

by Cache, Johnny | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
90. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
91. Computer networks : an open source approach

by Hwang, Ren-Hung | Baker, Fred | Lin, Ying Dar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2012Availability: Items available for loan: [Call number: 004.6 LIN] (1).
92. Building VPNs with IPSec and MPLS

by Tan, Nam-Kee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
93. Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions

by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
94. Broadband network & device security

by Lail, Benjamin M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.3821 LAI] (1).
95. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
96. Hardening windows systems : bulletproof your systems before you are hacked

by Bragg, Roberta.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
97. Hacking exposed Cisco networks : Cisco security secrets & solutions

by Vladimirov, Andrew A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
98. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
99. Data communications and network security

by Carr, Houston H | Snyder, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
100. Computer Networks : a systems approach

by Peterson, Larry L | Davie, Bruce S.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 PET] (1).

Powered by Koha