Results
|
|
Practical Computer Network Security by HENDRY, MIKE. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London Artech House 1995Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 004.6 HEN, ...
|
|
|
An Ethical Guide to Corporate Security by FADIA, ANKIT. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: delhi Macmillan 2004Availability: Items available for loan: Malaviya National Institute of Technology (3)Call number: 658 FAD,C-2, ...
|
|
|
Network Security A Decision and Game-Theoretic Approach by ALPCAN, TANSU | BASAR, TAMER. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi CAMBRIDGE UNIVERSITY PRESS 2011Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.78 ALP.
|
|
|
Security Awareness Applying Practical Security in Your World by CIAMPA, MARK. Edition: 3 . Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Dehli Cengage Learning 2012Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 CIA,E-3,C1, ...
|
|
|
Hacking Exposed 6 Network Secirity Secrets & Solutions by MC CLURE, STUART | KURTZ, GEORGE | SCAMBRAY, JOEL. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata McGraw-Hill 2009Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 MCC, C-1, ...
|
|
|
Outsourcing Information Security by AXELROD, C WARREN. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London Artech House 2004Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 AXE.
|
|
|
Actually Useful Internet Security Techniques by HUGHES, LARRY L. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: indianaplis New riders 1995Availability: Not available: Malaviya National Institute of Technology: Checked out (1).
|
|
|
Code Hacking by CONWAY , RICHARD | CORDINGLEY , JULIAN. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: MUMBAI SHROFF PUB.& DIST. 2004Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 CON.
|
|
|
Web Privacy with P3P by CRANOR, L ORRIE FAITH. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: MUMBAI SHROFF PUB.& DIST. 2002Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 CRA.
|
|
|
Network Security by BAKER , RICHARD H. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: NEW YORK MCGRAW-HILL INTERNATIONAL EDITIONS 1995Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 BAK.
|
|
|
Kerberos the Definitive Guide by GARMAN, JASON. Edition: 1 Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: MUMBAI SHROFF PUBLISHERS & DISTRIBUTORS 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.43 GAR.
|
|
|
Policy-Based Network Management by STRASSNER, JOHN C. Edition: 1 Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: San Francisco Morgan kaufmann 2005Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .
|
|
|
Inside Network Perimeter Security by NORTHCUTT, STEPHEN | WINTERS, SCOTT | ZELTSER, LENNY. Edition: 2 Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2005Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .
|
|
|
Cybersecurity Operations Handbook by RITTINGHOUSE, JOHN W | HANCOCK, WILLIAM M. Edition: 1 Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: SINGAPORE Elsevier 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .
|
|
|
CRYPTOGRAPHY AND NETWORK SECURITY: Principal and Practice by STALLINGS, WILLIAM. Edition: 3 Ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: DELHI: PEARSON, c2003Availability: Items available for loan: Malaviya National Institute of Technology (3)Call number: 005.8 STA, ...
|
|
|
Botnets: The killer web app by Schiller , Craig A | Harley , David | Binkley , Jim. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Elsevier c2007Availability: Items available for loan: Malaviya National Institute of Technology (6)Call number: 005 SCH, ...
|
|
|
|
|
|
|
|
|
|
|
|
Information security and privacy research : 27th IFIP TC 11 Information Security And Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings / [edited by] Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou. by Gritzalis, Dimitris (ed.) | Furnell, Steven [editor] | Theoharidou, Marianthi [editor]. Series: Ifip advances in information and communication technology ; 376Edition: 1st ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Springer, 2012Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 005.8 GRI.
|