141. Cryptography and network security : principles and practices

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
142. International conference on information security, ICIS-2005, December 7-9, 2005, proceedings

by Aghila, G | Gnanadass, R | Pondicherry Engineering College, Pondicherry | Sudha, Gnanou Florence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Allied Publishers, 2005Availability: Items available for loan: [Call number: 005.8 AGH] (1).
143. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
144. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
145. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
146. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
147. Threat modeling

by Swiderski, Frank | Snyder, Window.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
148. Hunting security bugs

by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
149. Information Warfare and Security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
150. Security+

by Calvert, Ben | Boswell, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Asia, 2004Availability: Items available for loan: [Call number: 005.8 CAM] (1).
151. Basics of contemporary cryptography for IT practitioners

by Ryabko, Boris | Fionov, Andrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
152. Hacking exposed Windows : windows security secrets & solutions

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
153. Incident response: investigating computer crime

by Prosise, Chris | Mandia, Kevin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 364.168 PRO] (1).
154. Public key infrastructure : concepts, design and deployment

by Saxena, Ashutosh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SAX] (1).
155. Firewalls : the complete reference

by Strassberg, Keith | Gondek, Richard | Rollie, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
156. Software forensics : collecting evidence from the scene of a digital crime

by Slade, Robert M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 SLA] (1).
157. Information assurance for the enterprise : a roadmap to information security

by Schou, Corey | Shoemaker, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
158. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
159. Hacking exposed wireless : wireless security secrets & solutions

by Cache, Johnny | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
160. Principles of computer security : security+ and beyond

by White, Gregory B | Cothren, Chuck | Williams, Dwayne.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).

Powered by Koha