Your search returned 145 results.

Sort
Results
101.
Guide to elliptic curve cryptography Hankerson Darrel; Menezes Alfred; Vanstone Scott by Series: Springer professional computing
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer-Verlag 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

102.
Smart card security and applications Hendry Mike by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1.

103.
Developing secure distributed systems with CORBA Lang Ulrich; Schreiner Rudolf by Series: Artech house computer security series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):41 P2 TD.

104.
Information security policies and actions in modern integrated systems Fugini Mariagrazia; Bellettini Carlo by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey Idea Group Publishing 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

105.
Role-based access control Ferraiolo David F; Kuhn D. Richard; Chandramouli Ramaswamy by Series: Artech House computer security series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.

106.
Secure computers and networks Fisch Eric A; White Gregory B by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton C R C Press 2000
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P0.

107.
Information security risk analysis Peltier Thomas R by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

108.
Information security management handbook Tipton Harold F Ed.; Krause Micki Ed. by
Edition: 5
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2004
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):(894)g P4 RR.

109.
110.
Investigator's guide to steganography Kipper Gregory by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

111.
Current security management and ethical issues of information technology Azari Rasool Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey IRM Press 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.

112.
New forensics: Investigation corporate fraud and the theft of intellectual property Anastasi Joe by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Jeresy John Wiley & Sons 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: Y:45:f P3.

113.
New forensics: Investigation corporate fraud and the theft of intellectual property Anastasi Joe by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Jeresy John Wiley & Sons 2003
Availability: No items available.

114.
An information security handbook Hunter John M D by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: London Springer-Verlag 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1 TD.

115.
Hybrid intrusion detection system Wang Yanxin by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

116.
Unix system security: a guide for users and system administrators Curry David A by Series: Addison-wesley professional computing series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Reading, Massachusetts Addison-Wesley Publishing Company 1992
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N2.

117.
IT-Security and privacy: design and use of privacy-enhancing security mechanisms Fischer-Hubner Simone by Series: Lecture notes in computer science; 1958
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B),2A:(894) P1 TD.

118.
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems Lin Hua by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

119.
Computer security in the 21st century Lee D T Ed.; Shieh S P Ed.; Tygar J D Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer Science+Business Media,Inc. 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

120.
Framework for network intelligence and security El-Semary Aly Mohamed by Series: A dissertation submitted in partial fulfillment of the requierements for the degree of doctor of Philosophy in the discipline of computer science
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

121.
Load balancing servers, firewalls, and caches Kopparapu Chandra by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York John Wiley Sons, Inc. 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D658,(B):7 P2 TD.

122.
Recent advances in intrusion detection Wespi Andreas Ed.; Vigna Giovanni Ed.; Deri Luca Ed. by Series: Lecute notes in computer science; 2516
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P2 TD.

123.
Recent advances in intrusion detection Vigna Giovanni Ed.; Jonsson Erland Ed.; Kruegel Christopher Ed. by Series: Lecture notes in computer science; 2820
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.

124.
Recent advances in intrusion detection Lee Wenke Ed.; Me Ludovic Ed.; Wespi Andreas Ed. by Series: Lecture notes in computer science; 2212
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1 TD.

125.
Integrated security scheme with resource-awareness for wireless Ad Hoc networks Deng Hongmei by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

126.
Comparative study of classification algorithms for network intrusion detection Wang Yunling by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

127.
Fundamentals of computer security Pieprzyk Josef; Hardjono Thomas; Seberry Jennifer by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.

128.
IT security: Advice from experts Oliva Lawrence M by Series: IT solutions books series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey Cyber Tech Publishing 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4.

129.
Handbook of security, cryptography and digital signature Bhaskar S M; Ramachandran P by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Viva Books Private Limited 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)k P6 TD.

130.
Digital signature Gupta Kailash N; Agarwala Prateek A Network security practices. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice - Hall 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.

131.
Digital signature Gupta Kailash N; Agarwala Prateek A Network security practices. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice - Hall 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.

132.
Digital signature Gupta Kailash N; Agarwala Prateek A Network security practices. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice - Hall 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.

133.
Network security essentials Stallings William Applications and standards. by
Edition: 3
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Chennai Pearson Education 2008
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P8.

134.
Network security Kaufman Charlie; Perlman Radia Private communication in a public world. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice-Hall 2002
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P2.

135.
Network security Kaufman Charlie; Perlman Radia Private communication in a public world. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice-Hall 2002
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P2.

136.
Network security Kaufman Charlie; Perlman Radia Private communication in a public world. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice-Hall 2002
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P2.

137.
Network security Kaufman Charlie; Perlman Radia Private communication in a public world. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice-Hall 2002
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P2.

138.
Network security Kaufman Charlie; Perlman Radia Private communication in a public world. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Prentice-Hall 2002
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P2.

139.
Network security Fadia Ankit A hacker's perspective by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Macmillan 2003
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P3.

140.
Network security Fadia Ankit A hacker's perspective by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Macmillan 2003
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P3.

141.
Network security Fadia Ankit A hacker's perspective by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Macmillan 2003
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P3.

142.
Network security Fadia Ankit A hacker's perspective by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Macmillan 2003
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P3.

143.
Network security Fadia Ankit A hacker's perspective by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Macmillan 2003
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P3.

144.
Principles of information security. Whitman Michael E; Mattord Herbert J by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Australia Thomson 2005
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P5.

145.
Network security Bragg Roberta; Phodes -Ousley Mark The complete reference by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Tata Mcgraw_Hill 2004
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P4.