|
81.
|
Protocols for authentication and key establishment
by Boyd, Colin | Mathuria, Anish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
|
|
82.
|
Payment technologies for E-Commerce
by Kou, Weidong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.8 KOU] (1).
|
|
83.
|
Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings
by Davida, George | Frankel, Yair | Rees, Owen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
|
|
84.
|
Security for telecommunications network management
by Rozenblit, Moshe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 621.382 ROZ] (1).
|
|
85.
|
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by Ballard, Jason | Ratliff, Bud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
86.
|
Improving web application security : threats and countermeasures
by Microsoft Corporation | Mackman, Alex | Meier, J. D | Vasireddy, Srinath. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.8 MIC] (1).
|
|
87.
|
Microsoft encyclopedia of security
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.803 TUL] (1).
|
|
88.
|
Network security bible
by Cole, Eric | Conley, James W | Krutz, Ronald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
89.
|
Corporate computer and network security
by Panko, Raymond R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
|
|
90.
|
IPSec : the new security standard for the Internet, intranets, and virtual private networks2nd ed.
by Harkins, Dan. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.821 DOR] (1).
|
|
91.
|
Real 802.11 security : Wi-Fi protected access and 802.11i
by Arbaugh, William A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 EDN] (1).
|
|
92.
|
Biometrics for network security
by Reid, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
|
|
93.
|
Network security hacks : hundred industrial strength tips and tools
by Lockhart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
|
|
94.
|
Web privacy with P3P
by Cranor, Lorrie Faith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
95.
|
802.11 security
by Potter, Bruce | Fleck, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
|
|
96.
|
Hacking : the art of exploitation
by Erickson, Jon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
|
|
97.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
98.
|
Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort
by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
99.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|
|
100.
|
Cryptography and network security : principles and practices
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
|