1. Building open source network security tools : components and techniques

by Schiffman, Mike D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
2. Wireless security essentials : defending mobile systems from data piracy

by Vines, Russell Dean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 VIN] (1).
3. Ajax for dummies

by Holzner, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 005.133 HOL] (1).
4. Programming for embedded systems : cracking the code

by Dreamtech Software Team.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.26 DRE] (4).
5. Mastering Java security : cryptography algorithms and architecture

by Helton, Rich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.73 HEL] (1).
6. Cryptography for Database and Internet Applications

by Galbreath, Nick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.82 GAL] (1).
7. Network Security For Windows

by Chirillo, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CHI] (2).
8. PHP bible

by Converse, Tim | Park, Joyce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.2762 CON] (4).
9. Official Red Hat Linux Administrators Guide

by Hat, Red.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.74 HAT] (2).
10. Professional assembly language

by Blum, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2005Availability: Items available for loan: [Call number: 005.136 BLU] (1).
11. Nanotechnology

by Booker, Richard | Boysen, Earl.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley Publishing, 2005Availability: Items available for loan: [Call number: 620.5 BOO] (1).
12. Art of deception : controlling the human element of security

by Simon, William L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
13. Beginning C# 2005 databases

by Watson, Karli.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 005.133 WAT] (1).
14. Service Oriented Architecture for Dummies

by Hurwitz, Judith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 004.65 HUR] (1).
15. Introducing 3ds Max 9 : 3D for beginners

by Derakhshani, Dariush | McFarland, Jon | Munn, Randi L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 006.696 DER] (2).
16. Windows vista security : securing vista against malicious attacks

by Grimes, Roger A | Johansson, Jesper M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 GRI] (1).
17. Ajax bible

by Holzner, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 006.78 HOL] (1).
18. Group policy : management, troubleshooting, and security

by Moskowitz, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.446 MOS] (1).
19. Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise

by Hoffman, Daniel V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
20. Implementing 802.1X security solutions for wired and wireless networks

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2008Availability: Items available for loan: [Call number: 004.68 GEI] (1).

Powered by Koha