Results
|
21.
|
Introduction to computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Pearson, ©2006
Availability: Items available for loan: IIITD (8)Call number: 005.8 BIS-I, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-I.
|
|
22.
|
Web hacking attack and defense by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Pearson, 2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 MCC-W.
|
|
23.
|
Internet cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, c2000
Availability: Items available for loan: IIITD (1)Call number: 005.82 SMI-I.
|
|
24.
|
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 SCH-A.
|
|
25.
|
Security for telecommunications networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Springer, 2008
Availability: Items available for loan: IIITD (2)Call number: 005.8 TRA-S, ...
|
|
26.
|
Modern cryptography : theory and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson, ©2004
Availability: Items available for loan: IIITD (3)Call number: 005.82 MAO-M, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 MAO-M. Not available: IIITD: Checked out (1).
|
|
27.
|
|
|
28.
|
|
|
29.
|
|
|
30.
|
|
|
31.
|
Wireless and mobile network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : TMH, 2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 VEN-W.
|
|
32.
|
|
|
33.
|
Multimedia forensics and security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hershey : Information Science Reference, c2009
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LIC-M.
|
|
34.
|
|
|
35.
|
Cryptography and network security by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 FOR-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C. Not available: IIITD: Checked out (1).
|
|
36.
|
|
|
37.
|
Fault analysis in cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Springer, 2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 JOY-F.
|
|
38.
|
|
|
39.
|
Security of mobile communications by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton : CRC Press, ©2010
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOU-S.
|
|
40.
|
Introduction to security and network forensics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.
|