|
1.
|
Beautiful security /edited by Andy Oram, John Viega
by Oram, Andy., ed | Viega, John., ed. Publisher: Mumbai Shroff Pub. 2009Availability: Items available for loan: Engineering Library [Call number: 005.8 BEA] (2).
|
|
2.
|
Ccnp security VPN 642-647: official cert guide / [by] Howard Hooper
by HOOPER, Howard. Publisher: New Delhi Pearson Education 2012Availability: Items available for loan: Main Library [Call number: 005.8076 HOO] (2). Items available for reference: Main Library [Call number: 005.8076 HOO] (2).
|
|
3.
|
COMPUTER security handbook / edited by Arthur E.Hutt, Seymour Bosworth, Douglas B.Hoyt
by Hutt, Arthur E [Editor] | Bosworth, Seymour [Editor] | Hoyt, Douglas B [Editor]. Edition: 2nd ed.Publisher: New York Macmillan pub. 1988Availability: Items available for loan: Main Library [Call number: 005.8 COM] (1).
|
|
4.
|
Cryptography and network security
by FOROUZAN, Behrouz A. Edition: Indian ed.Publisher: New Delhi Tata McGraw-Hill 2008Availability: Items available for loan: Main Library [Call number: 005.8 FOR] (2).
|
|
5.
|
Cryptography and network security
by KAHATE, Atul. Edition: 2nd ed.Publisher: New Delhi Tata McGraw-Hill Education 2009Availability: Items available for loan: Main Library [Call number: 005.8 KAH] (1).
|
|
6.
|
Cryptography and network security: principles and practices
by STALLINGS, William. Edition: 4th ed.Publisher: New Delhi Prentice-Hall of India 2008Availability: Items available for loan: Main Library [Call number: 005.8 STA] (2).
|
|
7.
|
Firewalls and VPNs: principles and practices / Richard W. Tibbs, Edward B. Oakes
by TIBBS, Richard W | Oakes, Edward B. Publisher: New Jersey Pearson Prentice hall 2005Availability: Items available for loan: Main Library [Call number: 005.8 TIB] (1).
|
|
8.
|
Guide to operating systems security / by Michael Palmer
by Palmer, Michael. Publisher: Canada Cengage Learning 2008Availability: Items available for loan: Engineering Library [Call number: 005.8 PAL] (1).
|
|
9.
|
Information security: principles and practices / Mark S. Merkow, Jim Breithaupt
by MERKOW, Mark S | Breithaupt, Jim. Publisher: New Jersey Pearson prentice hall 2006Availability: Items available for loan: Main Library [Call number: 005.8 MER] (1).
|
|
10.
|
Information systems today. / [by] Leonard M. Jessup and Joseph S. Valacich.
by JESSUP, Leonard M | Vilacich, Joseph S. Publisher: New Delhi. Prentice - Hall of India. 2003Availability: Items available for loan: Main Library [Call number: 004 JES] (1).
|
|
11.
|
Internet users' guide to network resource tools
by ISAACS, Margaret. Publisher: Harlow Addison-Wesley 1998Availability: Items available for loan: Main Library [Call number: 004.678 ISA] (1).
|
|
12.
|
Introduction to computer security / [by] Matt Bishop,Sathyanarayana S.Venkatramanayya
by Bishop, Matt | Venkatramanayya, Sathyanarayana S. Publisher: Delhi Pearson Education 2007Availability: Items available for loan: Engineering Library [Call number: 005.8 BIS] (1).
|
|
13.
|
Introduction to computer security
by BISHOP, Matt. Publisher: Delhi Pearson Education 2009Availability: Items available for loan: Main Library [Call number: 005.8 BIS] (1).
|
|
14.
|
Microsoft encyclopedia of security / Mitch Tulloch
by TULLOCH, Mitch. Edition: EEE.Publisher: New Delhi Prentice-Hall of India 2004Availability: Items available for loan: Main Library [Call number: 005.8 TUL] (1).
|
|
15.
|
Operating systems : internals and design principles / [by] Willson Stallings
by STALLINGS, William. Edition: 4th ed.Publisher: New Delhi Pearson Educatioon 2003Availability: Items available for loan: Main Library [Call number: 005.42 STA] (1).
|
|
16.
|
Software security: theory, programming, and practice /by Richard Sinn
by Sinn, Richard. Publisher: Canada Cengage Learning 2009Availability: Items available for loan: Engineering Library [Call number: 005.8 SIN] (1).
|
|
17.
|
Writing secure code /by Michael Howard, David LeBlanc
by Howard, Michael | LeBlanc, David. Edition: 2nd ed.Publisher: Bangalore WP Pub. 2003Availability: Items available for loan: Engineering Library [Call number: 005.8 HOW] (1).
|
|
18.
|
The Norton pcAnywhere: user's guide
by SYMANTEC Corporation. Publisher: [USA] SYMANTEC 1991Availability: Items available for loan: Main Library [Call number: 005.8 SYM] (1).
|
|
19.
|
Computer security basics / Deborah Russell and G.T. Gangemi Sr.
by Russell, Deborah | Gangemi, G. T. Edition: [Rev. ed.]Publisher: Sebastopol : 1992. O'Reilly and AssociatesAvailability: Items available for loan: Technology Library [Call number: 005.8 RUS] (1).
|
|
20.
|
Applied cryptography: protocols, algorithms, and source code in C
by Schneier, Bruce. Edition: 2nd ed. Publisher: New York John Wiley & sons. 1996Availability: Items available for loan: Engineering Library [Call number: 005.82 SCH] (1).
|