101. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
102. Protecting your PC

by Barile, Ian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
103. Network infrastructure security

by Weaver, Randy | Weaver, Dawn.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Cengage Learning, 2009Availability: Items available for loan: [Call number: 005.8 WEA] (1).
104. Computer security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson, 2010Availability: Items available for loan: [Call number: 005.8 STA] (3).
105. Network security essentials : applications and standards

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson, 2011Availability: Items available for loan: [Call number: 005.8 STA] (1).
106. Information security : a practical approach

by Bhaskar, S. M | Ahson, S. I.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2008Availability: Items available for loan: [Call number: 005.8 BHA] (1).
107. Code hacking : a developer's guide to network security

by Cordingley, Julian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
108. Snort cookbook

by Orebaugh, Angela | Babbin, Jacob | Biles, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
109. Network security : issues, challenges and techniques

by Bhattacharyya, Dhruba K | Sarma, Nityananda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
110. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 6th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.82 STA] (1).
111. Trust and security in collaborative computing

by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
112. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
113. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
114. Information security illuminated

by Chapple, Mike | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Jones & Bartlett, 2005Availability: Items available for loan: [Call number: 005.8 SOL] (1).
115. Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers

by Dingledine, Roger | Syverson, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 DIN] (1).
116. Enterprise security : IT security solutions : concepts, practical experiences, technologies

by Sauerbrey, Joerg | Fumy, Walter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
117. Network security and management

by Singh, Brijendra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.8 SIN] (1).
118. Security warrior

by Peikari, Cyrus | Chuvakin, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers/O'Reilly, 2004Availability: Items available for loan: [Call number: 005.8 PEI] (1).
119. Traffic analysis for network security

by Chen, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2005Availability: Items available for loan: [Call number: 005.8 CHE] (1).
120. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).

Powered by Koha