Log in
Koha online
Library
Title
Author
Subject
ISBN
Series
Call number
Go
Advanced search
Course reserves
Authority search
Tag cloud
Search history
[
x
]
×
Log in to your account
Login:
Password:
Forgot your password?
Refine your search
Availability
Limit to currently available items.
Authors
Boyd, Colin
Jha, Somesh
Mathuria, Anish
Item types
Books
Series
Information security...
Lecture notes in com...
Topics
Computer network pro...
Computers Security
Data transmission sy...
Information security...
Information systems ...
Show more
Your query retrived 2 records.
|
Unhighlight
Highlight
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
1.
Protocols for authentication and key establishment
by
Boyd, Colin
|
Mathuria, Anish.
Material type:
Book
; Format:
print
; Literary form:
Not fiction
Publisher:
Berlin: Springer-Verlag, 2003
Availability:
Items available for loan:
[
Call number:
005.82 BOY] (2).
Place hold
2.
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings
by
Mathuria, Anish
|
Jha, Somesh.
Material type:
Book
; Format:
print
; Literary form:
Not fiction
Publisher:
Berlin: Springer, 2010
Availability:
Items available for loan:
[
Call number:
004 MAT] (2).
Place hold
Powered by
Koha