|
1.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
2.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
3.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
4.
|
Corporate computer and network security
by Panko, Raymond R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
|
|
5.
|
Computer security : art and science
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (3). Items available for reference: [Call number: 005.8 BIS] (1).
|
|
6.
|
Biometrics for network security
by Reid, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
|
|
7.
|
Firewalls and Internet security : repelling the wily hacker
by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
8.
|
Java 2 Network Security
by Pistoia, Marco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
9.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
10.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
11.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
|
|
12.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
13.
|
Applied algebra: Codes, ciphers and discrete algorithms
by Hardy, Darel W | Walker, Carol L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
|
|
14.
|
NET security and cryptography
by Thorsteinson, Peter | Ganesh, G. Gnana Arun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
|
|
15.
|
Security in distributed computing : did you lock the door?
by Dempsey, Rob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
16.
|
Exploiting software : how to break code
by Gary, McGraw | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
17.
|
Introduction to computer security
by Goodrich, Michael T | Roberto, Tamassia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2011Availability: Items available for loan: [Call number: 005.8 GOO] (1).
|
|
18.
|
Computer security : principles and practice
by Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
|
|
19.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
20.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.82 STA] (1).
|