Your search returned 24 results.

Sort
Results
Practical Computer Network Security

by HENDRY, MIKE.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London Artech House 1995Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 004.6 HEN, ...

An Ethical Guide to Corporate Security

by FADIA, ANKIT.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: delhi Macmillan 2004Availability: Items available for loan: Malaviya National Institute of Technology (3)Call number: 658 FAD,C-2, ...

Network Security A Decision and Game-Theoretic Approach

by ALPCAN, TANSU | BASAR, TAMER.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi CAMBRIDGE UNIVERSITY PRESS 2011Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.78 ALP.

Security Awareness Applying Practical Security in Your World

by CIAMPA, MARK.

Edition: 3 . Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Dehli Cengage Learning 2012Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 CIA,E-3,C1, ...

Hacking Exposed 6 Network Secirity Secrets & Solutions

by MC CLURE, STUART | KURTZ, GEORGE | SCAMBRAY, JOEL.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi Tata McGraw-Hill 2009Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 MCC, C-1, ...

Outsourcing Information Security

by AXELROD, C WARREN.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London Artech House 2004Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 AXE.

Actually Useful Internet Security Techniques

by HUGHES, LARRY L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: indianaplis New riders 1995Availability: Not available: Malaviya National Institute of Technology: Checked out (1).

Code Hacking

by CONWAY , RICHARD | CORDINGLEY , JULIAN.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: MUMBAI SHROFF PUB.& DIST. 2004Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 CON.

Web Privacy with P3P

by CRANOR, L ORRIE FAITH.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: MUMBAI SHROFF PUB.& DIST. 2002Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 CRA.

Network Security

by BAKER , RICHARD H.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: NEW YORK MCGRAW-HILL INTERNATIONAL EDITIONS 1995Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 BAK.

Kerberos the Definitive Guide

by GARMAN, JASON.

Edition: 1 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: MUMBAI SHROFF PUBLISHERS & DISTRIBUTORS 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.43 GAR.

Policy-Based Network Management

by STRASSNER, JOHN C.

Edition: 1 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco Morgan kaufmann 2005Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .

Inside Network Perimeter Security

by NORTHCUTT, STEPHEN | WINTERS, SCOTT | ZELTSER, LENNY.

Edition: 2 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi Pearson Education 2005Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .

Cybersecurity Operations Handbook

by RITTINGHOUSE, JOHN W | HANCOCK, WILLIAM M.

Edition: 1 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: SINGAPORE Elsevier 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .

CRYPTOGRAPHY AND NETWORK SECURITY: Principal and Practice

by STALLINGS, WILLIAM.

Edition: 3 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: DELHI: PEARSON, c2003Availability: Items available for loan: Malaviya National Institute of Technology (3)Call number: 005.8 STA, ...

Botnets: The killer web app

by Schiller , Craig A | Harley , David | Binkley , Jim.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York Elsevier c2007Availability: Items available for loan: Malaviya National Institute of Technology (6)Call number: 005 SCH, ...

Distributed networks : intelligence, security, and applications / edited by Qurban A. Memon.

by Memon,Qurban A., (ed.) | Memon, Qurban A. (Qurban Ali).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York Crc Press 2014Online access: Cover image Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 005.8 MEM.

Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamaning, Daniel.

Series: Artech House information security and privacy seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: London Artech House 2014Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 005.8 RAS.

Computer and information security handbook / edited by John R. Vacca.

by Vacca , John R.(ed.).

Edition: 2nd.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Singapore Elsevier c2013Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 005.8 VAC.

Information security and privacy research : 27th IFIP TC 11 Information Security And Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings / [edited by] Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou.

by Gritzalis, Dimitris (ed.) | Furnell, Steven [editor] | Theoharidou, Marianthi [editor].

Series: Ifip advances in information and communication technology ; 376Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Springer, 2012Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 005.8 GRI.

Pages

©2021-2022 Learning Resource Centre, Malaviya National Institute of Technology Jaipur