Your search returned 20 results. Subscribe to this search

Not what you expected? Check for suggestions
|
1. Beautiful security /edited by Andy Oram, John Viega

by Oram, Andy., ed | Viega, John., ed.

Publisher: Mumbai Shroff Pub. 2009Availability: Items available for loan: Engineering Library [Call number: 005.8 BEA] (2).

2. Ccnp security VPN 642-647: official cert guide / [by] Howard Hooper

by HOOPER, Howard.

Publisher: New Delhi Pearson Education 2012Availability: Items available for loan: Main Library [Call number: 005.8076 HOO] (2). Items available for reference: Main Library [Call number: 005.8076 HOO] (2).

3. COMPUTER security handbook / edited by Arthur E.Hutt, Seymour Bosworth, Douglas B.Hoyt

by Hutt, Arthur E [Editor] | Bosworth, Seymour [Editor] | Hoyt, Douglas B [Editor].

Edition: 2nd ed.Publisher: New York Macmillan pub. 1988Availability: Items available for loan: Main Library [Call number: 005.8 COM] (1).

4. Cryptography and network security

by FOROUZAN, Behrouz A.

Edition: Indian ed.Publisher: New Delhi Tata McGraw-Hill 2008Availability: Items available for loan: Main Library [Call number: 005.8 FOR] (2).

5. Cryptography and network security

by KAHATE, Atul.

Edition: 2nd ed.Publisher: New Delhi Tata McGraw-Hill Education 2009Availability: Items available for loan: Main Library [Call number: 005.8 KAH] (1).

6. Cryptography and network security: principles and practices

by STALLINGS, William.

Edition: 4th ed.Publisher: New Delhi Prentice-Hall of India 2008Availability: Items available for loan: Main Library [Call number: 005.8 STA] (2).

7. Firewalls and VPNs: principles and practices / Richard W. Tibbs, Edward B. Oakes

by TIBBS, Richard W | Oakes, Edward B.

Publisher: New Jersey Pearson Prentice hall 2005Availability: Items available for loan: Main Library [Call number: 005.8 TIB] (1).

8. Guide to operating systems security / by Michael Palmer

by Palmer, Michael.

Publisher: Canada Cengage Learning 2008Availability: Items available for loan: Engineering Library [Call number: 005.8 PAL] (1).

9. Information security: principles and practices / Mark S. Merkow, Jim Breithaupt

by MERKOW, Mark S | Breithaupt, Jim.

Publisher: New Jersey Pearson prentice hall 2006Availability: Items available for loan: Main Library [Call number: 005.8 MER] (1).

10. Information systems today. / [by] Leonard M. Jessup and Joseph S. Valacich.

by JESSUP, Leonard M | Vilacich, Joseph S.

Publisher: New Delhi. Prentice - Hall of India. 2003Availability: Items available for loan: Main Library [Call number: 004 JES] (1).

11. Internet users' guide to network resource tools

by ISAACS, Margaret.

Publisher: Harlow Addison-Wesley 1998Availability: Items available for loan: Main Library [Call number: 004.678 ISA] (1).

12. Introduction to computer security / [by] Matt Bishop,Sathyanarayana S.Venkatramanayya

by Bishop, Matt | Venkatramanayya, Sathyanarayana S.

Publisher: Delhi Pearson Education 2007Availability: Items available for loan: Engineering Library [Call number: 005.8 BIS] (1).

13. Introduction to computer security

by BISHOP, Matt.

Publisher: Delhi Pearson Education 2009Availability: Items available for loan: Main Library [Call number: 005.8 BIS] (1).

14. Microsoft encyclopedia of security / Mitch Tulloch

by TULLOCH, Mitch.

Edition: EEE.Publisher: New Delhi Prentice-Hall of India 2004Availability: Items available for loan: Main Library [Call number: 005.8 TUL] (1).

15. Operating systems : internals and design principles / [by] Willson Stallings

by STALLINGS, William.

Edition: 4th ed.Publisher: New Delhi Pearson Educatioon 2003Availability: Items available for loan: Main Library [Call number: 005.42 STA] (1).

16. Software security: theory, programming, and practice /by Richard Sinn

by Sinn, Richard.

Publisher: Canada Cengage Learning 2009Availability: Items available for loan: Engineering Library [Call number: 005.8 SIN] (1).

17. Writing secure code /by Michael Howard, David LeBlanc

by Howard, Michael | LeBlanc, David.

Edition: 2nd ed.Publisher: Bangalore WP Pub. 2003Availability: Items available for loan: Engineering Library [Call number: 005.8 HOW] (1).

18. The Norton pcAnywhere: user's guide

by SYMANTEC Corporation.

Publisher: [USA] SYMANTEC 1991Availability: Items available for loan: Main Library [Call number: 005.8 SYM] (1).

19. Computer security basics / Deborah Russell and G.T. Gangemi Sr.

by Russell, Deborah | Gangemi, G. T.

Edition: [Rev. ed.]Publisher: Sebastopol : 1992. O'Reilly and AssociatesAvailability: Items available for loan: Technology Library [Call number: 005.8 RUS] (1).

20. Applied cryptography: protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York John Wiley & sons. 1996Availability: Items available for loan: Engineering Library [Call number: 005.82 SCH] (1).

© University of Jaffna