Results
|
|
51.
|
Grid computing security by Chakrabarti Anirban by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P7 TD.
|
|
|
52.
|
|
|
|
53.
|
|
|
|
54.
|
|
|
|
55.
|
|
|
|
56.
|
|
|
|
57.
|
|
|
|
58.
|
|
|
|
59.
|
Computer security and cryptography by Konheim Alan G by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons, Inc, 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.
|
|
|
60.
|
|
|
|
61.
|
|
|
|
62.
|
|
|
|
63.
|
|
|
|
64.
|
|
|
|
65.
|
|
|
|
66.
|
|
|
|
67.
|
|
|
|
68.
|
|
|
|
69.
|
|
|
|
70.
|
|
|
|
71.
|
|
|
|
72.
|
|
|
|
73.
|
|
|
|
74.
|
|
|
|
75.
|
|
|
|
76.
|
Managing information security by Vacca John R Ed. by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Amsterdam Elsevier 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.
|
|
|
77.
|
|
|
|
78.
|
Windows forensic analysis DVD tool kit by Carvey Harlan by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Burlington Syngress Publishing Inc. 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P9 TD.
|
|
|
79.
|
|
|
|
80.
|
|
|
|
81.
|
|
|
|
82.
|
|
|
|
83.
|
|
|
|
84.
|
|
|
|
85.
|
|
|
|
86.
|
|
|
|
87.
|
|
|
|
88.
|
|
|
|
89.
|
|
|
|
90.
|
|
|
|
91.
|
|
|
|
92.
|
Security complete Security complete by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi BPB Publications 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1.
|
|
|
93.
|
|
|
|
94.
|
|
|
|
95.
|
|
|
|
96.
|
|
|
|
97.
|
Soft computing techniques for intrusion detection Gomez Jonatan by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.
|
|
|
98.
|
|
|
|
99.
|
|
|
|
100.
|
Halting the hacker Pipkin Donald L by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey Prentice Hall PTR 1997
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N7.
|