61. Load Balancing Servers, Firewalls and Caches

by Kopparapu, Chandra.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
62. Implementing SSH : strategies for optimizing the secure shell

by Dwivedi, Himanshu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
63. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
64. Networking approach to grid computing

by Minoli, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Wiley-Interscience, 2004Availability: Items available for loan: [Call number: 004.36 MIN] (1).
65. Information security : principles and practice

by Stamp, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Wiley-Interscience, 2005Availability: Items available for loan: [Call number: 005.8 STA] (1).
66. Business Data Communications and Networking

by Fitzgerald, Jerry | Dennis, Alan.

Edition: 9th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 004.6 FIT] (1).
67. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
68. Computer security

by Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 1999Availability: Items available for loan: [Call number: 005.8 GOL] (2).
69. Basic methods of cryptography

by Gee, Steve | Lubbe, J. C. A. van der.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1998Availability: Items available for loan: [Call number: 005.82 LUB] (1).
70. Fundamentals of error-correcting codes

by Huffman, W. Cary | Pless, Vera.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2003Availability: Items available for loan: [Call number: 005.72 HUF] (1).
71. Understanding Data Communications and Networks

by Shay, William A.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 004.6 SHA] (1).
72. PC pest control : protect your computers from malicious internet invaders.

by Gralla, Preston.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
73. Database security and auditing : protecting data integrity and accessibility

by Afyouni, Hassan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 005.8 AFY] (1).
74. Peter Norton's network security fundamentals

by Norton, Peter | Stockman, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
75. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
76. HTTP developer's handbook

by Shiflett, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2003Availability: Items available for loan: [Call number: 004.678 SHI] (1).
77. Securing Web services with WS-security : demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption

by Remy, David | Rosenberg, Jothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Sams Publishing, 2004Availability: Items available for loan: [Call number: 005.8 ROS] (1).
78. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
79. Unwanted gaze : a dictionary of privacy in America

by Rosen, Jeffrey.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Vintage, 2001Availability: Items available for loan: [Call number: 342.730858 ROS] (1).
80. Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security

by Chandra, Praphul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).

Powered by Koha