|
81.
|
Cryptography in C and C++
by Welschenbach, Michael | Kramer, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
|
|
82.
|
Designing Systems for Internet Commerce
by Treese, G. Winfield | Stewart, Lawrence C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 658.8002854678 TRE] (1).
|
|
83.
|
Network Securitry Essentials
by Stallings, Willam | Stallings, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
84.
|
Introduction to cryptography
by Buchmann, Johannes. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 003.54 BUC] (1).
|
|
85.
|
Chinese remainder theorem : applications in computing, coding, cryptography
by Pei, D | Ding, C | Salomaa, A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore: World Scientific, 1996Availability: Items available for loan: [Call number: 512.72 DIN] (1).
|
|
86.
|
Internet Cryptography
by Smith, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
|
|
87.
|
Coding theory and cryptology
by Niederreiter, Harald | Niederreiter, Harald | Niederreiter, Harald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2002Availability: Items available for loan: [Call number: 003.54 NIE] (1).
|
|
88.
|
Basics of contemporary cryptography for IT practitioners
by Ryabko, Boris | Fionov, Andrey. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
|
|
89.
|
Cryptonomicon
by Stephenson, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Avon Books, 2002Availability: Items available for loan: [Call number: 813.54 STE] (1).
|
|
90.
|
Firewalls : complete guide
by Goncalves, Marcus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.754 GON] (3).
|
|
91.
|
IPSec: securing VPNs
by Davis, Carlton R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
|
|
92.
|
Information Theory, Coding and Cryptography
by Bose, Ranjan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BOS] (3).
|
|
93.
|
Cryptography and network security
by Kahate, Atul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
|
|
94.
|
Cryptography and network security
by Forouzan, Behrouz A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
95.
|
Cryptography demystified
by Hershey, John E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.82 HER] (1).
|
|
96.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
97.
|
RSA Security's Official Guide to Cryptography
by Burnett, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BUR] (2).
|
|
98.
|
Electronic commerce : security, risk management and control
by Greenstein, Marilyn | Feinman, Todd M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
|
|
99.
|
Cryptography : an introduction
by Smart, Nigel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill Education, 2002Availability: Items available for loan: [Call number: 005.82 SMA] (3).
|
|
100.
|
Internet Security Guidebook
by Ellis, Juanita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).
|