161. Computer Networks and Internets : with internet applications

by Comer, Douglas E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 004.6 COM] (4).
162. Biometrics for network security

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
163. Computer networking

by Rowe, Stanford H | Schuh, Marsha L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2005Availability: Items available for loan: [Call number: 004.6 ROW] (1).
164. Guide to networking essentials

by Tomsho, Greg | Johnson, David | Tittel, Ed.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 004.6 TOM] (2).
165. Network security hacks : hundred industrial strength tips and tools

by Lockhart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
166. Web privacy with P3P

by Cranor, Lorrie Faith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 CRA] (1).
167. 802.11 security

by Potter, Bruce | Fleck, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
168. Enterprise service bus

by Chappell, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.73 CHA] (1).
169. Hacking : the art of exploitation

by Erickson, Jon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2003Availability: No items available Checked out (1).
170. Managing security with snort and IDS tools

by Cox, Kerry | Gerg, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
171. Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort

by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
172. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
173. Computer networking : a top-down approach featuring the Internet

by Kurose, James F | Ross, Keith W.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson, 2006Availability: Items available for loan: [Call number: 004.678 KUR] (5). Checked out (1).
174. Proceedings of the International Conference on Controls, Automation and Communications Systems (ICCACS-2004), December 22-24, 2004

by Mishra, Dhanada K | Ramachandran, P. N.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Allied Publishers, 2004Availability: Items available for loan: [Call number: 004 MIS] (1).
175. UNIX network programming : networking APIs : sockets and XTI. Volume 1

by Stevens, W. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.712768 STE] (11).
176. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
177. Principles of distributed database systems

by Ozsu, M. Tamer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.74 OZS] (6).
178. Mpls & Label switching networks

by Black, Uyless.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 004.66 BLA] (1).
179. C++ Network Programming, Volume I : Mastering Complexity with ACE and Patterns

by Schmidt, Douglas C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.2762 SCH] (1).
180. MPLS and VPN architectures

by Pepelnjak, Ivan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 004.65 PEP] (1).

Powered by Koha