101. Java 2 Network Security

by Pistoia, Marco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2001Availability: Items available for loan: [Call number: 005.8 PIS] (1).
102. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education Asia, 2002Availability: Items available for loan: [Call number: 005.8 KAU] (6).
103. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
104. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
105. Threat modeling

by Swiderski, Frank | Snyder, Window.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bangalore: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SWI] (1).
106. Hunting security bugs

by Gallagher, Tom | Jeffries, Bryan | Landauer, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 GAL] (1).
107. Multimedia fingerprinting forensics for traitor tracing

by Liu, K. J. Ray.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
108. Hacking exposed Windows : windows security secrets & solutions

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 SCA] (1).
109. Firewalls : the complete reference

by Strassberg, Keith | Gondek, Richard | Rollie, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.8 STR] (1).
110. Network security : the complete reference

by Bragg, Roberta | Phodes-Ousley, Mark | Strassberg, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
111. Cryptography and network security

by Kahate, Atul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.82 KAH] (1).
112. Hacking exposed wireless : wireless security secrets & solutions

by Cache, Johnny | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
113. Mobile application security.

by Dwivedi, Himanshu | Clark, Chris | Thiel, David V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2010Availability: Items available for loan: [Call number: 005.8 DWI] (1).
114. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 FOR] (1).
115. Building VPNs with IPSec and MPLS

by Tan, Nam-Kee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
116. Wi-Fi security

by Miller, Stewart S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 MIL] (1).
117. Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions

by Dwivedi, Himanshu | Cannings, Rich | Lackey, Zane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2008Availability: Items available for loan: [Call number: 005.8 CAN] (1).
118. Broadband network & device security

by Lail, Benjamin M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 621.3821 LAI] (1).
119. Digital signatures

by Atreya, Mohan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
120. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).

Powered by Koha