Results
|
1.
|
Scene of cybercrime by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.
|
|
2.
|
|
|
3.
|
|
|
4.
|
|
|
5.
|
Crimeware : understanding new attacks and defenses by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-C.
|
|
6.
|
Microsoft encyclopedia of security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.
|
|
7.
|
Network security essentials : applications and standards by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.
|
|
8.
|
|
|
9.
|
Internet cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, c2000
Availability: Items available for loan: IIITD (1)Call number: 005.82 SMI-I.
|
|
10.
|
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 SCH-A.
|
|
11.
|
Security for telecommunications networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Springer, 2008
Availability: Items available for loan: IIITD (2)Call number: 005.8 TRA-S, ...
|
|
12.
|
Modern cryptography : theory and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson, ©2004
Availability: Items available for loan: IIITD (3)Call number: 005.82 MAO-M, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 MAO-M. Not available: IIITD: Checked out (1).
|
|
13.
|
|
|
14.
|
Wireless and mobile network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : TMH, 2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 VEN-W.
|
|
15.
|
|
|
16.
|
Multimedia forensics and security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hershey : Information Science Reference, c2009
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LIC-M.
|
|
17.
|
|
|
18.
|
Cryptography and network security by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 FOR-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C. Not available: IIITD: Checked out (1).
|
|
19.
|
|
|
20.
|
|