121. Practical cryptography

by Schneier, Bruce | Ferguson, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 FER] (1).
122. Network security bible

by Cole, Eric | Conley, James W | Krutz, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2005Availability: Items available for loan: [Call number: 005.8 COL] (1).
123. Computer security

by Gollmann, Dieter.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: John Wiley & Sons, 2006Availability: Items available for loan: [Call number: 005.8 GOL] (1).
124. Corporate computer and network security

by Panko, Raymond R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 PAN] (2).
125. Computer security : art and science

by Bishop, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (3). Items available for reference: [Call number: 005.8 BIS] (1).
126. Biometrics for network security

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 REI] (1).
127. Firewalls and Internet security : repelling the wily hacker

by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
128. Computer forensics : computer crime scence investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
129. Oracle Security

by Theriault, Marlene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 1999Availability: Items available for loan: [Call number: 005.74 THE] (1).
130. Network security hacks : hundred industrial strength tips and tools

by Lockhart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
131. Web Security, Privacy and Commerce

by Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 GAR] (1).
132. MCSE/MCSA implementing and administering security in a Windows 2000 network

by Schmied, Will.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (2).
133. Managing cisco network security

by Knipp, Eric.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.8 KNI] (1).
134. Hacking : the art of exploitation

by Erickson, Jon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
135. Managing security with snort and IDS tools

by Cox, Kerry | Gerg, Christopher.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
136. Security assessment : case studies for implementing the NSA IAM

by Miles, Greg | Fuller, Ed | Hoagberg, Matthew | Rogers, Russ.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 MIL] (1).
137. Stealing the network : how to own continent

by Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 RUS] (1).
138. Cryptography in C and C++

by Welschenbach, Michael | Kramer, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
139. Firewall : check point NG VPN-1/FireWall, ISA server,Cisco PIX FireWall, Nokia IP series appliances, Linux/Solaris FireWall & intrusion detection with snort

by Shimonski, Robert | Carasik-Henmi, Anne | Shinder, Debra Littlejohn | Shinder, Thomas W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
140. CISSP Certification exam study guide

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).

Powered by Koha