41. Network and parallel computing : IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, proceedings

by Hai, Jin | Chen, Hao | Gao, Guang R | Xu, Zhiwei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JIN] (1).
42. Privacy enhancing technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004; revised selected papers

by Martin, David | Serjantov, Andrei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 MAR] (1).
43. E-commerce agents : marketplace solutions, security issues, and suply and demand

by Ye, Yiming | Liu, Jiming | Ye, Yiming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2001Availability: Items available for loan: [Call number: 006.3 LIU] (1).
44. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
45. Security for telecommunications network management

by Rozenblit, Moshe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 621.382 ROZ] (1).
46. Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant

by Ballard, Jason | Ratliff, Bud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
47. Improving web application security : threats and countermeasures

by Microsoft Corporation | Mackman, Alex | Meier, J. D | Vasireddy, Srinath.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.8 MIC] (1).
48. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.803 TUL] (1).
49. Network security bible

by Cole, Eric | Conley, James W | Krutz, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
50. Corporate computer and network security

by Panko, Raymond R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
51. Biometrics for network security

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
52. Network security hacks : hundred industrial strength tips and tools

by Lockhart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
53. Web privacy with P3P

by Cranor, Lorrie Faith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 CRA] (1).
54. 802.11 security

by Potter, Bruce | Fleck, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
55. Hacking : the art of exploitation

by Erickson, Jon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2003Availability: No items available Checked out (1).
56. Managing security with snort and IDS tools

by Cox, Kerry | Gerg, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
57. Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort

by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
58. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
59. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
60. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).

Powered by Koha