Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Computer networks - security measures"', page 1 of 12
Refine your search
Availability
Limit to records with available items
Authors
Adams, Carlisle
Ahson, S. I.
Aissi, Selim
Aitel, Dav
Akanbi, Oluwatobi Ayodeji
Alder, Raven
Allen, Julia H.
Amini, Pedram
Amiri, Iraj Sadegh
Andress, Jason
Bragg, Roberta
Chapple, Mike
Cole, Eric
Du, Ding-Zhu
Dwivedi, Himanshu
Goodman, Seymour E.
Hardjono, Thomas
McClure, Stuart
Stallings, William
Vacca, John R.
Show more
Show less
Item types
Audio/Video
Books
CD-DVDs
Reference Books
Series
Adances in information security
Addison-Wesley software security series
Adelphi papers
Artech House computer security series
Artech House information security and priacy series
Artech House information security and privacy series
Chapman & Hall/CRC computer and information science series
Chapman & Hall/CRC cryptography and network security
Charles Rier Media general computing series
Charles Rier Media networking series
Communications in computer and information science
IFIP adances in information and communication technology
Information security and cryptography
International Federation for Information Processing
ITSO networking series
Lecture notes in computer science
Morgan Kaufmann series in computer security
Prentice Hall series in computer networking and distributed systems
Security series
Theory in practice
Show more
Show less
Topics
Business enterprises -- Computer networks -- Security measures
Coding theory
Computer hackers
Computer network protocols
Computer networks - Security measures
Computer networks -- Security measures
Computer networks Security measures
Computer networks -- Security measures -- Congresses
Computers -- Access control
Computer security
Computer security -- Congresses
Cryptography
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet -- Security measures
Network security
Public key infrastructure (Computer security)
Security
Wireless communication systems -- Security measures
World Wide Web -- Security measures
Show more
Show less
Your search returned 236 results.
Not what you expected? Check for
suggestions
Sort
1
2
3
4
5
6
7
8
9
10
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
1.
Image from Google Jackets
Network and system security
by
Vacca, John R
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Burlington:
Syngress,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VAC
.
Place hold
Save to lists
2.
Image from Google Jackets
Security monitoring
by
Fry, Chris
Nystrom, Martin
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Sebastopol:
O'Reilly,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 FRY
.
Place hold
Save to lists
3.
Image from Google Jackets
Intrusion detection systems
by
Di Pietro, Roberto
Mancini, Luigi V
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PIE
.
Place hold
Save to lists
4.
Image from Google Jackets
Computer and information security handbook
by
Vacca, John R
Series:
Morgan Kaufmann series in computer security
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Morgan Kaufmann,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VAC
.
Place hold
Save to lists
5.
Image from Google Jackets
Network security technologies
by
Fung, Kwok T
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
Auerbach Publications,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 FUN
.
Place hold
Save to lists
6.
Image from Google Jackets
Network security fundamentals
by
Reese, Rachelle
Series:
Wiley pathways
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
John Wiley & Sons,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 REE
.
Place hold
Save to lists
7.
Image from Google Jackets
Network security
by
Huang, Scott C
Du, Ding-Zhu
MacCallum, David
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HUA
.
Place hold
Save to lists
8.
Image from Google Jackets
Multicast and group security
by
Hardjono, Thomas
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HAR
.
Place hold
Save to lists
9.
Image from Google Jackets
Beautiful security : leading security experts explain how they think
by
Oram, Andy
Viega, John
Series:
Theory in practice
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Beijing:
O'Reilly,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ORA
.
Place hold
Save to lists
10.
Image from Google Jackets
Computer network security : theory and practice
by
Wang, Jie
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WAN
.
Place hold
Save to lists
11.
Image from Google Jackets
Introduction to security and network forensics
by
Buchanan, William J
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
Auerbach Publications,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BUC
.
Place hold
Save to lists
12.
Image from Google Jackets
Computer and information security handbook
by
Vacca, John R
Series:
Morgan Kaufmann series in computer security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
Elsevier,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VAC
.
Place hold
Save to lists
13.
Image from Google Jackets
Network security : the complete reference
by
Bragg, Roberta
Phodes-Ousley, Mark
Strassberg, Keith
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BRA
.
Place hold
Save to lists
14.
Image from Google Jackets
Planning for PKI: Best practices guide for deploying public key infrastructure
by
Housley, Russ
Polk, Tim
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
John Wiley & Sons,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HOU
.
Place hold
Save to lists
15.
Image from Google Jackets
Digital identity management : technological, business, and social implications
by
Birch, David G. W
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Aldershot:
Gower,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
658.478 BIR
.
Place hold
Save to lists
16.
Image from Google Jackets
Cryptography and network security
by
Forouzan, Behrouz A
Series:
McGraw-Hill Forouzan networking series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
McGraw-Hill,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 FOR
.
Place hold
Save to lists
17.
Image from Google Jackets
Information security : a practical approach
by
Bhaskar, S. M
Ahson, S. I
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Narosa Publishing House,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BHA
.
Place hold
Save to lists
18.
Image from Google Jackets
Mobile hybrid intrusion detection : the MOVICAB-IDS system
by
Herrero, Alvaro
Corchado, Emilio
Series:
Studies in computational intelligence
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HER
.
Place hold
Save to lists
19.
Image from Google Jackets
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
by
Skoudis, Ed
Liston, Tom
Series:
Radia Perlman series in computer networking and security
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Upper Saddle River:
Prentice Hall,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SKO
.
Place hold
Save to lists
20.
Image from Google Jackets
Process of network security: Designing and managing a safe network
by
Wadlow, Thomas A
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Addison-Wesley,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 WAD
.
Place hold
Save to lists
1
2
3
4
5
6
7
8
9
10
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion