|
21.
|
Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001
by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
22.
|
Public-key cryptography
by Salomma, Arto. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
|
|
23.
|
Local Area Networks and Their Applications
by Tangney, Brendan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2000Availability: Items available for loan: [Call number: 005.754 TAN] (1).
|
|
24.
|
Data Communications
by Gupta, Prakash C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 621.382 GUP] (4).
|
|
25.
|
Computer networks
by Tanenbaum, Andrew S. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2002Availability: Items available for loan: [Call number: 004.6 TAN] (6).
|
|
26.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
27.
|
Security assessment : case studies for implementing the NSA IAM
by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
|
|
28.
|
Solaris Security
by Gregory, Peter H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 621.389 GRE] (1).
|
|
29.
|
Computer networks
by Tanenbaum, Andrew S. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 004.6 TAN] (6).
|
|
30.
|
Network security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
|
|
31.
|
Biometrics : Identity assurance in the information age
by Woodward, John D | Higgins, Peter | Orlans, Nicholas M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill Osborne Media, 2003Availability: Items available for loan: [Call number: 621.38928 WOO] (1).
|
|
32.
|
Practical intrusion detection handbook
by Proctor, Paul E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
33.
|
Computer networks
by Trivedi, Bhushan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Oxford University Press, 2011Availability: Items available for loan: [Call number: 004.6 TRI] (2).
|
|
34.
|
Access denied : the practice and policy of global Internet filtering
by Deibert, Ronald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2008Availability: Items available for loan: [Call number: 005.8 DEI] (1).
|
|
35.
|
Access control systems : security, identity management and trust models
by Benantar, Messaoud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
|
|
36.
|
Privacy-respecting intrusion detection
by Flegel, Ulrich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
|
|
37.
|
Securing biometrics applications
by Shoniregun, Charles A | Crosier, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 363.23 SHO] (1).
|
|
38.
|
Smart cards, tokens, security and applications
by Mayes, Keith E | Markantonakis, Konstantinos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
39.
|
Trust Management
by Etalle, Sandro | Marsh, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
|
|
40.
|
Modern cryptology : a tutorial
by Brassard, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
|