841. Handbook of security, cryptography and digital signature

by Bhaskar, S. M | Ramachandran, P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Viva Books, 2006Availability: Items available for loan: [Call number: 005.82 BHA] (1).
842. Hacking Web services

by Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).
843. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dorling Kindersley, 2007Availability: Items available for loan: [Call number: 005.8 PFL] (4).
844. CGI Programming With Perl

by Guelich, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.75 GUE] (1).
845. Programming ColdFusion

by Brooks-Bilson, Rob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai Shroff Publishers 2001Availability: Items available for loan: [Call number: 005.13 BRO] (1).
846. Java in a Nutshell

by Flanagan, David.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.73 FLA] (1).
847. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
848. XML, web services and the data revolution

by Coyle, Frank P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.74 COY] (1).
849. Understanding Microsoft Windows 2000 Distributed Services

by Chappell, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: WP Publishers, 2000Availability: Items available for loan: [Call number: 005.437 CHA] (1).
850. Social and economic security in india

by Dev, S. Mahendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Institute for Human Development, 2001Availability: Items available for loan: [Call number: 362.0954 DEV] (1).
851. Relevance of GM technology to Indian agriculture and food security

by Sahai, Suman | Gene Campaign.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Gene Campaign, 2004Availability: Items available for loan: [Call number: 363.192 SAH] (1).
852. Effective COM

by Box, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.437 BOX] (4).
853. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
854. IBM websphere starter kit

by Ben-Natan, Ro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw Hill, 2000Availability: Items available for loan: [Call number: 005.73 BEN] (2).
855. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
856. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
857. Hacker's handbook : the strategy behind breaking into and defending networks

by Susan Young | Aitel, Dav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
858. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
859. Policy-based network configuration management for MANETs

by Chadha, Ritu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2008Availability: Items available for loan: [Call number: 004.6 CHA] (1).
860. Cooperative mobile positioning : bringing social lifestyle into wireless location

by Figueiras, Joao Carlos Prazeres | Frattasi, Simone.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 621.384 FIG] (1).

Powered by Koha