861. Internet infrastructure security

by Chakrabarti, Anirban | Manimaran, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 621.3192 CHA] (1).
862. Security and information assurance

by Malek, Manu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2003Availability: Items available for loan: [Call number: 005.8 MAL] (1).
863. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
864. Tutorial on wireless LAN (Wi-Fi) security

by Yu, James T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 621.319 YU,] (1).
865. Web security

by Chen, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (1).
866. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
867. Basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice.

by Rountree, Derrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam Elsevier Science 2014Availability: Items available for loan: [Call number: 004.6782 ROU] (1).
868. Bug hunter's diary : a guided tour through the wilds of software security.

by Klein, Tobias.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco No Starch Press 2011Availability: Items available for loan: [Call number: 005.8 KLE] (1).
869. Cloud computing : concepts, technology & architecture

by Erl, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Prentice Hall 2013Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
870. Cloud Computing Design Patterns.

by Erl, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Prentice Hall 2015Availability: Items available for loan: [Call number: 004.6782 ERL] (1).
871. First food : culture of taste

by narain, sunita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Centre For Science and Environment 2013Availability: Items available for loan: [Call number: 641.5954 NAR] (1).
872. Artificial immune system : applications in computer security

by Tan, Ying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Wiley-IEEE Computer Society Press, 2016Availability: Items available for loan: [Call number: 005.8 TAN] (1).
873. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
874. Mathematical modelling for next-generation cryptography: CRESptography T crypto-math project

by Takagi, Tsuyoshi | Wakayama, Masato | Tanaka, Keisuke | Kunihiro, Noboru | Kimoto, Kazufumi | Dung Hoang Duong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: Springer, 2017Availability: Items available for loan: [Call number: 005.82 TAK] (1).
875. Secure data deletion

by Reardon, Joel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2016Availability: Items available for loan: [Call number: 005.74 REA] (1).
876. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
877. Driver's license

by Castile, Meredith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 929.9 CAS] (1).
878. Mathematics of secrets : cryptography from caesar ciphers to digital encryption

by Holden, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2017Availability: Items available for loan: [Call number: 005.82 HOL] (1).
879. Password

by Eve, Martin Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Bloomsbury Academic, 2017Availability: Items available for loan: [Call number: 005.8 EVE] (1).
880. Visual cryptography and secret image sharing

by Climato, Stelvio | Yang, Ching-Nung.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Crc Press, 2011Availability: Items available for loan: [Call number: 005.82 CIM] (1).

Powered by Koha