Results
|
41.
|
|
|
42.
|
|
|
43.
|
Computer security handbook, vol I by
Edition: Sixth edition.Vol.I
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.
|
|
44.
|
Computer security handbook, vol II by
Edition: 6th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.
|
|
45.
|
Secure messaging on the internet by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston: Artech House, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 OPP-S.
|
|
46.
|
The craft of system security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
|
|
47.
|
|
|
48.
|
Implementing SSL/TLS using cryptography and PKI by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title: - Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.
|
|
49.
|
Practical EJB project for beginners by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai: SPD, 2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-P.
|
|
50.
|
|
|
51.
|
Network security and management by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Haryana : PHI Learning, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 SIN-N.
|
|
52.
|
Cryptography and network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi PHI Learning ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 GUP-C.
|
|
53.
|
Anti hacker toolkit by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.
|
|
54.
|
|
|
55.
|
Secure multiparty computation and secret sharing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.
|
|
56.
|
Network security and cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Delhi : Cengage Learning, ©2010
Availability: Not available: IIITD: Loan on demand (1).
|
|
57.
|
Instant burp suite starter by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai : Packt Publishing, ©2013
Availability: Items available for loan: IIITD (1)Call number: 658.11 CAR-B.
|
|
58.
|
|
|
59.
|
Public-key cryptography : theory and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, ©2009
Availability: Not available: IIITD: Loan on demand (1).
|
|
60.
|
|