1. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
2. Developing distributed and E-commerce applications

by Ince, Darrel.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Pearson Addison Wesley, 2003Availability: Items available for loan: [Call number: 005.1 INC] (2).
3. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
4. GSM and UMTS : creation of global mobile communication

by Hillebrand, Friedhelm.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.3845 HIL] (2).
5. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
6. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
7. Understanding WAP

by Heijden, Marcel Vander.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Artech House, 2000Availability: Items available for loan: [Call number: 621.3845 HEI] (2).
8. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
9. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
10. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
11. Using Microsoft SQL Server 7.0

by Wynkoop, Stephen.

Edition: Special ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 1999Availability: Items available for loan: [Call number: 005.74 WYN] (3).
12. Microsoft commerce solutions

by Micro Modeling Associates.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.7 MIC] (2).
13. Running Microsoft Internet Information Server

by Powell, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 004.6 POW] (3).
14. Microsoft application center 2000 : resource kit

by Microsoft Press.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2001Availability: Items available for loan: [Call number: 005.7 PRE] (2).
15. Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets

by Wallace, Michael | Webber, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
16. Oracle 8 Bible

by McCullough-Dieter, Carol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: IDG Books Worldwide, 2000Availability: Items available for loan: [Call number: 005.74 MCC] (4).
17. Red Hat Linux Networking and System Administration

by Collings, Terry | Wall, Kurt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2002Availability: Items available for loan: [Call number: 005.754 COL] (2).
18. Hack attacks revealed : a complete reference for Unix, Windows, and Linux with custom security toolkit

by Chirillo, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-dreamtech India, 2002Availability: Items available for loan: [Call number: 005.821 CHI] (2).
19. Network Security For Windows

by Chirillo, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CHI] (2).
20. Computer forensics : computer crime scence investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).

Powered by Koha