Your search returned 11 results.

Sort
Results
The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System

by BLUNDEN, REVEREND BILL.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London JONES AND BARTLETT PUBLISHERS 2012Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 BLU, C-1, ...

Access Control, Authentication, and Public Key Infrastructure

by BALLAD, BILL | BANKS, ERIN K | BALLAD, TRICIA.

Series: Information Systems Security and Assurance SeriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi JONES & BARTLETT LEARNING 2011Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 005.8 BAL,C-1, ...

Security in Computing

by PFLEEGER, CHARLES P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersy Prentice Hall 1989Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.8 PEL.

Public-Key Cryptography

by SALOMAA, ARTO.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi Springer 1996Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.82 SAL.

Public-Key Cryptography

by DAS, ABHIJIT | VENI MADHAVAN, C E.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi Pearson Education 2009Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.82 DAS.

Biometrics Identity Verification in a Networked World

by NANAVATI, S | NANAVATI, R | THIEME, M.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: NEW DELHI WILEY DREAMTECH 2002Availability: Items available for loan: Malaviya National Institute of Technology (2)Call number: 570.15195 NAN, ...

Kerberos the Definitive Guide

by GARMAN, JASON.

Edition: 1 Ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: MUMBAI SHROFF PUBLISHERS & DISTRIBUTORS 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.43 GAR.

STUDY OF WIRELESS MEDIUM ACCESS CONTROL PROTOCOLS edited by AGRAWAL SANJEEV

by JHALANI ANKUR | AGRAWAL SANJEEV.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: JAIPUR ELECTRONICS & COMMUNICATION ENGINEERING MNIT JAIPUR 2003Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: .

Modern cryptography : theory and practice

by Mao, Wenbo.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Pearson Education, 2004Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 005.82 MAO.

TMAC for Cognitive Radio Networks using Software Defined Radio a dissertation report

by Bagaria, Anuj. (2015PCP5156) | Batula B.Ramesh [supvr].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Jaipur. Deptt Of Computer Science and Engineering Malviya National Institute Of Technology 2018Availability: Items available for loan: Malaviya National Institute of Technology (1)Call number: 004 Batt.

Secure spectrum aware medium access control mechanism for cognitive radio based 5G-IoT : a thesis report

by Reddy, Avuthu Avinash (2017RCP9014) | Gopalani, Dinesh [Supvr.] | Battula,Ramesh Babu [Supvr.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Jaipur Department of Computer Science & Engineering, MNIT 2022Availability: Items available for reference: Malaviya National Institute of Technology: Not for loan (1)Call number: 004.

Pages

©2021-2022 Learning Resource Centre, Malaviya National Institute of Technology Jaipur