|
21.
|
|
|
22.
|
|
|
23.
|
|
|
24.
|
|
|
25.
|
|
|
26.
|
|
|
27.
|
|
|
28.
|
|
|
29.
|
Introduction to Computer Security Matt Bishop by Bishop, Matt | Venkatramanayya, Sathyanarayana S | Sathyanarayana S. Venkatramanayya. Material type: Text Publication details: New Jersey Pearson Education 2006Availability: Items available for loan: Call number: 005.8 BIS (1).
|
|
30.
|
Introduction to Modern Cryptography Jonathan Katz by Katz, Jonathan | Lindell, Yehuda. Material type: Text Publication details: London Chapman and Hall 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 KAT (1). :
|
|
31.
|
|
|
32.
|
ISA Server 2004 Thomas W. Shinder by Shinder, Thomas W | Shinder, Debra Littlejohn. Material type: Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: 005.821 SHI (1).
|
|
33.
|
|
|
34.
|
|
|
35.
|
|
|
36.
|
|
|
37.
|
|
|
38.
|
|
|
39.
|
Recent Advances in Intrusion Detection (LNCS: 4637): 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings by Christopher, Kruegel by Kruegel, Christopher | Clark, Andrew | Lippmann, Richard. Material type: Text Publication details: Netherlands Springer Verlag, Netherlands 2007Availability: Items available for reference: Not for loanCall number: REF 005 LN KRU (1). :
|
|
40.
|
|