|
1.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
2.
|
Developing distributed and E-commerce applications
by Ince, Darrel. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Pearson Addison Wesley, 2003Availability: Items available for loan: [Call number: 005.1 INC] (2).
|
|
3.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
4.
|
GSM and UMTS : creation of global mobile communication
by Hillebrand, Friedhelm. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.3845 HIL] (2).
|
|
5.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
6.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
7.
|
Understanding WAP
by Heijden, Marcel Vander. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Artech House, 2000Availability: Items available for loan: [Call number: 621.3845 HEI] (2).
|
|
8.
|
Computer forensics : computer crime scene investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
9.
|
Software vulnerability guide
by Thompson, Herbert H | Chase, Scott G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
|
|
10.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
11.
|
Using Microsoft SQL Server 7.0
by Wynkoop, Stephen. Edition: Special ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 1999Availability: Items available for loan: [Call number: 005.74 WYN] (3).
|
|
12.
|
Microsoft commerce solutions
by Micro Modeling Associates. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.7 MIC] (2).
|
|
13.
|
Running Microsoft Internet Information Server
by Powell, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 004.6 POW] (3).
|
|
14.
|
Microsoft application center 2000 : resource kit
by Microsoft Press. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.7 PRE] (2).
|
|
15.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
16.
|
Oracle 8 Bible
by McCullough-Dieter, Carol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: IDG Books Worldwide, 2000Availability: Items available for loan: [Call number: 005.74 MCC] (4).
|
|
17.
|
Red Hat Linux Networking and System Administration
by Collings, Terry | Wall, Kurt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2002Availability: Items available for loan: [Call number: 005.754 COL] (2).
|
|
18.
|
Hack attacks revealed : a complete reference for Unix, Windows, and Linux with custom security toolkit
by Chirillo, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-dreamtech India, 2002Availability: Items available for loan: [Call number: 005.821 CHI] (2).
|
|
19.
|
Network Security For Windows
by Chirillo, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CHI] (2).
|
|
20.
|
Computer forensics : computer crime scence investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|