Results
|
81.
|
Secure messaging on the internet by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston: Artech House, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 OPP-S.
|
|
82.
|
The craft of system security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
|
|
83.
|
|
|
84.
|
Implementing SSL/TLS using cryptography and PKI by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title: - Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.
|
|
85.
|
|
|
86.
|
Social security for women by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi ; Association of Indian Universities, © 2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 368.4 PAN-S.
|
|
87.
|
|
|
88.
|
|
|
89.
|
|
|
90.
|
|
|
91.
|
Malware, rootkits & botnets beginner's guide by
Material type: Text; Format:
available online
; Literary form:
Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 ELI-M, ...
|
|
92.
|
Database security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Delhi: Cengage Learning, ©2012
Availability: Items available for loan: IIITD (2)Call number: 005.8 BAS-D, ...
|
|
93.
|
Practical EJB project for beginners by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai: SPD, 2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-P.
|
|
94.
|
|
|
95.
|
Network security and management by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Haryana : PHI Learning, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 SIN-N.
|
|
96.
|
Cryptography and network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi PHI Learning ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 GUP-C.
|
|
97.
|
|
|
98.
|
Anti hacker toolkit by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.
|
|
99.
|
Programming for mobile and remote computers by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Dreamtech, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.133 THA-P.
|
|
100.
|
|