Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Internet -Security measures"', page 1 of 2
Refine your search
Availability
Limit to records with available items
Authors
Aharony, Nadav
Altshuler, Yaniv
Ballard, Jason
Camp, L. Jean
Carlson, Jacob
Chuat, Laurent
Cremers, Armin B.
Crume, Jeff
Denning, Dorothy E.
Denning, Peter J.
Dietrich, Sven
Dittrich, David
Dubuisson, Olivier
Egan, Mark
Elovici, Yuval
Endorf, Carl
Ghosh, Anup K.
Gouda, Mohamed G.
Gralla, Preston
Oppliger, Rolf
Show more
Show less
Item types
Books
Series
Adances in information security
Artech House computer security series
Artech House information security and priacy series
Chapman & Hall/CRC cryptography and network security
NATO science for peace and security series. Series D, information and communication security
Prentice-Hall PTR Web infrastructure series
Show more
Show less
Topics
Abstract Syntax Notation. One (ASN.1)
ARPANET
Business enterprises -- Computer networks -- Security measures
Cellular telephone systems -- Access control
Computer network protocols
Computer networks -- Security measures
Computer security
COMPUTERS / Networking / General
COMPUTERS / Security / General
COMPUTERS / Software Development & Engineering / General
Data encryption (Computer science)
Electronic commerce -- Security measures
Internet
Internet governance
Internet -- Security measures
Internet Security measures
Intranets (Computer networks) -- Security measures
Privacy, Right of
Security measures
Wireless Internet -- Security measures
Show more
Show less
Your search returned 37 results.
Not what you expected? Check for
suggestions
Sort
1
2
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
1.
Image from Google Jackets
Inside Internet security : what hackers don't want you to know
by
Crume, Jeff
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Harlow:
Addison-Wesley,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CRU
.
Place hold
Save to lists
2.
Image from Google Jackets
Wireless Internet security : architecture and protocols
by
Kempf, James
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge:
Cambridge University Press,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 KEM
.
Place hold
Save to lists
3.
Image from Google Jackets
PC pest control : protect your computers from malicious internet invaders.
by
Gralla, Preston
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Sebastopol:
O'Reilly,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GRA
.
Place hold
Save to lists
4.
Image from Google Jackets
Hop integrity in the Internet
by
Huang, Chin-Tser
Gouda, Mohamed G
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HUA
.
Place hold
Save to lists
5.
Image from Google Jackets
Web application hacker?s handbook : discovering and exploiting security flaws
by
Stuttard, Dafydd
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Indianapolis:
Wiley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 STU
.
Place hold
Save to lists
6.
Image from Google Jackets
Synchronizing Internet Protocol Security (SIPSec)
by
Shoniregun, Charles A
Series:
Adances in information security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 SHO
.
Place hold
Save to lists
7.
Image from Google Jackets
Future of the Internet and How to Stop it
by
Zittrain, Jonathan
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
London:
Penguin Books,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
004.6780112 ZIT
.
Place hold
Save to lists
8.
Image from Google Jackets
Securing Web services : practical usage of standards and specifications
by
Periorellis, Panos
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hershey:
Information Science Reference,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 PER
.
Place hold
Save to lists
9.
Image from Google Jackets
AA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
by
Nakhjiri, Madjid
Nakhjiri, Mahsa
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Harlow:
John Wiley & Sons,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 NAK
.
Place hold
Save to lists
10.
Image from Google Jackets
Network security hacks : hundred industrial strength tips and tools
by
Lockhart, Andrew
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Mumbai:
SPD,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 LOC
.
Place hold
Save to lists
11.
Image from Google Jackets
Network intrusion detection
by
Northcutt, Stephen
Novak, Judy
Edition:
3rd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Delhi:
Pearson Education,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 NOR
.
Place hold
Save to lists
12.
Image from Google Jackets
Intrusion detection & prevention
by
Endorf, Carl
Mellander, Jim
Schultz, Eugene
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
California:
McGraw-Hill/Osborne,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 END
.
Place hold
Save to lists
13.
Image from Google Jackets
Security and privacy in social networks
by
Altshuler, Yaniv
Aharony, Nadav
Cremers, Armin B
Elovici, Yuval
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2012
Availability:
Items available for loan:
DAU
(1)
Call number:
006.754 ALT
.
Place hold
Save to lists
14.
Image from Google Jackets
Host Identity Protocol (HIP) : towards the secure mobile Internet
by
Gurtov, Andrei
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hoboken:
Wiley,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 GUR
.
Place hold
Save to lists
15.
Image from Google Jackets
Practical Internet security
by
Vacca, John R
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2007
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 VAC
.
Place hold
Save to lists
16.
Image from Google Jackets
Internet security : cryptographic principles, algorithms, and protocols
by
Rhee, Man Young
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chichester:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 RHE
.
Place hold
Save to lists
17.
Image from Google Jackets
Internet denial of service : attack and defense mechanisms
by
Mirkovic, Jelena
Dietrich, Sven
Dittrich, David
Reiher, Peter
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Jersey:
Prentice Hall,
2004
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MIR
.
Place hold
Save to lists
18.
Image from Google Jackets
SSL and TLS : theory and practice
by
Oppliger, Rolf
Series:
Artech House information security and priacy series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2009
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 OPP
.
Place hold
Save to lists
19.
Image from Google Jackets
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by
Ballard, Jason
Ratliff, Bud
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Prentice Hall of India,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 BAL
.
Place hold
Save to lists
20.
Image from Google Jackets
Internet and intranet security management : risks and solutions
by
Janczewski, Lech
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Hershey:
Idea Group Pub.,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 JAN
.
Place hold
Save to lists
1
2
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion