81. Cryptography in C and C++

by Welschenbach, Michael | Kramer, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
82. Designing Systems for Internet Commerce

by Treese, G. Winfield | Stewart, Lawrence C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 658.8002854678 TRE] (1).
83. Network Securitry Essentials

by Stallings, Willam | Stallings, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
84. Introduction to cryptography

by Buchmann, Johannes.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 003.54 BUC] (1).
85. Chinese remainder theorem : applications in computing, coding, cryptography

by Pei, D | Ding, C | Salomaa, A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: World Scientific, 1996Availability: Items available for loan: [Call number: 512.72 DIN] (1).
86. Internet Cryptography

by Smith, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.678 SMI] (1).
87. Coding theory and cryptology

by Niederreiter, Harald | Niederreiter, Harald | Niederreiter, Harald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2002Availability: Items available for loan: [Call number: 003.54 NIE] (1).
88. Basics of contemporary cryptography for IT practitioners

by Ryabko, Boris | Fionov, Andrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2005Availability: Items available for loan: [Call number: 005.82 RYA] (1).
89. Cryptonomicon

by Stephenson, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Avon Books, 2002Availability: Items available for loan: [Call number: 813.54 STE] (1).
90. Firewalls : complete guide

by Goncalves, Marcus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.754 GON] (3).
91. IPSec: securing VPNs

by Davis, Carlton R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 DAV] (1).
92. Information Theory, Coding and Cryptography

by Bose, Ranjan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BOS] (3).
93. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
94. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
95. Cryptography demystified

by Hershey, John E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.82 HER] (1).
96. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
97. RSA Security's Official Guide to Cryptography

by Burnett, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 BUR] (2).
98. Electronic commerce : security, risk management and control

by Greenstein, Marilyn | Feinman, Todd M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 658.84 GRE] (1).
99. Cryptography : an introduction

by Smart, Nigel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill Education, 2002Availability: Items available for loan: [Call number: 005.82 SMA] (3).
100. Internet Security Guidebook

by Ellis, Juanita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Academic Press, 2001Availability: Items available for loan: [Call number: 005.8 ELL] (1).

Powered by Koha