1. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
2. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
3. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
4. Corporate computer and network security

by Panko, Raymond R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
5. Computer security : art and science

by Bishop, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (3). Items available for reference: [Call number: 005.8 BIS] (1).
6. Biometrics for network security

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
7. Firewalls and Internet security : repelling the wily hacker

by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
8. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
9. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
10. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
11. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
12. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
13. Applied algebra: Codes, ciphers and discrete algorithms

by Hardy, Darel W | Walker, Carol L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
14. NET security and cryptography

by Thorsteinson, Peter | Ganesh, G. Gnana Arun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
15. Security in distributed computing : did you lock the door?

by Dempsey, Rob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
16. Exploiting software : how to break code

by Gary, McGraw | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
17. Introduction to computer security

by Goodrich, Michael T | Roberto, Tamassia.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2011Availability: Items available for loan: [Call number: 005.8 GOO] (1).
18. Computer security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
19. Network security essentials : applications and standards

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
20. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.82 STA] (1).

Powered by Koha