Results
|
61.
|
Computer security : principles and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.
|
|
62.
|
|
|
63.
|
|
|
64.
|
SQL injection attacks and defense by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.
|
|
65.
|
Privacy and security for cloud computing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.
|
|
66.
|
|
|
67.
|
Computer and information security handbook by
Edition: Second edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.
|
|
68.
|
Energy efficient distributed computing systems by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 ZOM-E.
|
|
69.
|
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson, c1999
Availability: Items available for loan: IIITD (1)Call number: 004.62 STA-S.
|
|
70.
|
|
|
71.
|
|
|
72.
|
An introduction to client/server computing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : New Age international, ©2009
Availability: Items available for loan: IIITD (1)Call number: 004.36 YAD-I.
|
|
73.
|
|
|
74.
|
Data communications and networking by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : McGraw-Hill, ©2013
Availability: Items available for loan: IIITD (1)Call number: 004.6 FOR-D.
|
|
75.
|
|
|
76.
|
Principles and practices of interconnection networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: San Francisco : Morgan Kaufmann Publishers, ©2004
Availability: Items available for loan: IIITD (1)Call number: REF 004.65 DAL-P.
|
|
77.
|
The craft of system security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
|
|
78.
|
|
|
79.
|
Implementing SSL/TLS using cryptography and PKI by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title: - Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.
|
|
80.
|
Computer networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: S.K Kataria & Sons, ©2010
Availability: Items available for loan: IIITD (1)Call number: 004.6 SHA-C.
|