21. Security protocols : 9th international workshop Cambridge, UK, April 25-27, 2001

by Christianson, Bruce | Crispo, Bruno | Malcolm, James A | Roe, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CHR] (1).
22. Public-key cryptography

by Salomma, Arto.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
23. Local Area Networks and Their Applications

by Tangney, Brendan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2000Availability: Items available for loan: [Call number: 005.754 TAN] (1).
24. Data Communications

by Gupta, Prakash C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 621.382 GUP] (4).
25. Computer networks

by Tanenbaum, Andrew S.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2002Availability: Items available for loan: [Call number: 004.6 TAN] (6).
26. Managing security with snort and IDS tools

by Cox, Kerry | Gerg, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
27. Security assessment : case studies for implementing the NSA IAM

by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
28. Solaris Security

by Gregory, Peter H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 621.389 GRE] (1).
29. Computer networks

by Tanenbaum, Andrew S.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 004.6 TAN] (6).
30. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
31. Biometrics : Identity assurance in the information age

by Woodward, John D | Higgins, Peter | Orlans, Nicholas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill Osborne Media, 2003Availability: Items available for loan: [Call number: 621.38928 WOO] (1).
32. Practical intrusion detection handbook

by Proctor, Paul E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
33. Computer networks

by Trivedi, Bhushan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Oxford University Press, 2011Availability: Items available for loan: [Call number: 004.6 TRI] (2).
34. Access denied : the practice and policy of global Internet filtering

by Deibert, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2008Availability: Items available for loan: [Call number: 005.8 DEI] (1).
35. Access control systems : security, identity management and trust models

by Benantar, Messaoud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
36. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
37. Securing biometrics applications

by Shoniregun, Charles A | Crosier, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 363.23 SHO] (1).
38. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
39. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
40. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).

Powered by Koha