1. ICMID-2010 : international conference on mobile internet devices

by Gokaraja Rangaraju Institute of Engineering and Technology.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bachupally: Gokaraja Rangaraju Institute of Engineering and Technology, 2010Availability: Items available for loan: [Call number: 004 GOK] (1).
2. Hindu survey of Indian agriculture 2006

by Hindu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Kasturi & Sons Ltd, 2006Availability: Items available for loan: [Call number: 630.723954 HIN] (1).
3. In search of economic alternatives for gender and social justice : voices from India

by Wichterich, Christa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Belgium: WIDE, 2010Availability: Items available for loan: [Call number: 303.372 WIC] (1).
4. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
5. Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations

by Datta, Anupam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
6. SQL Server 7: Administration

by Linsenbardt, Mark | Stigler, M. Shane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.74 LIN] (1).
7. Advances in computers : information security. Volume 60

by Zelkowitz, Marvin V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004 ZEL] (1).
8. ASN.1 communication between heterogeneous systems

by Dubuisson, Olivier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
9. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
10. Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
11. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
12. How secure is your wireless network? : safeguarding your Wi-Fi-LAN

by Barken, Lee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 BAR] (1).
13. Core security patterns : best practices and strategies for J2EE, web services and identity management

by Steel, Christopher | Lai, Ray | Nagappan, Ramesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 STE] (1).
14. Internet denial of service : attack and defense mechanisms

by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
15. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
16. Security in computing

by Pfleeger, Charles P.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
17. Crypto : how the code rebels beat the government - saving privacy in the digital age

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
18. Computer, ethics, and society

by Ermann, M. David | Ermann, M. David | Shauf, Michele | Shauf, Michele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 303.4834 ERM] (1).
19. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
20. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).

Powered by Koha