Your search returned 106 results.

61.
Foundations of Computer Security David Salomon.

by Salomon, D.

Material type: Text Text Publication details: London Springer Verlag, Netherlands 2006Availability: Items available for reference: Not for loanCall number: REF 005.8 SAL (1). :

62.
Art of deception: controlling the human element of security by Kevin D. Mitnick and William L. Simon

by Mitnick, Kevin D | Simon, William L.

Material type: Text Text Availability: Items available for reference: Not for loanCall number: REF 006.4 MIT (1). :

63.
Computer security Dieter Gollmann

by Gollman, Dieter.

Edition: 2nd ed.Material type: Text Text Publication details: Singapore John Wiley & Sons 2006Availability: Items available for loan: Call number: 005.8 GOL (3).

64.
Computer Privacy Annoyances : how to avoid the most annoying invasions of your personal and online psrivacy Dan Tynan

by Tynan, Dan.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: 005.8 TYN (3).

65.
Computer Security Basics Rick Lehtinen

by Lehtinen, Rick | Sr., G. T. Gangemi | Russell, Deborah.

Edition: 2nd ed.Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 LEH (7).

66.
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas

by Pejas, Jerzy | Piegat, Andrzej.

Material type: Text Text Publication details: Boston Kluwer Academic Publishers 2005Availability: Items available for reference: Not for loanCall number: REF 005.8 PEJ (1). :

67.
Firewalls: the complete reference Keith E. Strassberg

by Strassberg, Keith E.

Edition: 1st Ed.Material type: Text Text Publication details: New Delhi Tata McGraw-Hill Publishing Company 2004Availability: Items available for loan: Call number: 005.8 STR (3).

68.
Information Assurance Architecture Keith D. Willett

by Willett, Keith D.

Material type: Text Text Publication details: London Auerbach Publications 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 WIL (1). :

69.
Mobile Computation with Functions By Zeliha Dilsun Kirli

by Kirli, Zeliha Dilsun.

Material type: Text Text Publication details: Boston Kluwer Academic Publishers 2002Availability: Items available for reference: Not for loanCall number: REF 004.165 KIR (1). :

70.
Network Security Essentials: applications and standards William Stallings

by Stallings, William.

Material type: Text Text Publication details: New Delhi Pearson Education Asia 2005Availability: Items available for loan: Call number: 005.8 STA (8).

71.
Optical and Digital Techniques for Information Security Bahram Javidi

by Javidi, Bahram.

Material type: Text Text Publication details: Berlin Springer Verlag 2005Availability: Items available for loan: Call number: 005.8 JAV (1). Items available for reference: Not for loanCall number: REF 005.8 JAV (1).

72.
Principles of Computer Security : security +tm and beyond Wm. Arthur Conklin

by Conklin, Wm. Arthur | Cothren, Chuck | White, Gregory B.

Material type: Text Text Publication details: New Delhi DreamTech 2004Availability: Items available for loan: Call number: 005.8 CON (3).

73.
Principles of Computer Security : security +tm and beyond Wm. Arthur Conklin

by Conklin, Wm. Arthur | Cothren, Chuck | White, Gregory B.

Material type: Text Text Publication details: New Delhi DreamTech 2004Availability: Items available for loan: Call number: CDR CON (3).

74.
Role Based Access Control David F. Ferraiolo

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn Richard D.

Edition: 2nd ed.Material type: Text Text Publication details: Bostan Artech House 2007Availability: Items available for reference: Not for loanCall number: REF 005.8 FER (1). :

75.
Secure Coding in C and C++ Robert C. Seacord

by Seacord, Robert C.

Material type: Text Text Publication details: New Delhi Pearson Education Asia 2006Availability: Items available for loan: Call number: 005.8 SEA (7).

76.
Securing Information and Communication Systems: principles, technologies and application Edited by Steven M. Furnell

by Furnell, Steven M | Lopez, Javier | Katsikas, Sokratis.

Material type: Text Text Publication details: Bostan Artech House 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 FUR (1). :

77.
System-on-Chip Architectures and Implementations for Private-Key data Encryption Maire McLoone

by McLoone, Maire | McCanny, John V.

Material type: Text Text Publication details: New York Kluwer Academic Publishers 2003Availability: Items available for reference: Not for loanCall number: REF 005.8 MCL (1). :

78.
Wireless Operational Security John W. Rittinghouse

by Rittinghouse, John W | Ransome, James F.

Material type: Text Text Publication details: Amsterdam Elsevier 2004Availability: Items available for loan: Call number: 005.8 RIT (1).

79.
Identity-Based Encryption Sanjit Chatterjee

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2011Availability: Items available for reference: Not for loanCall number: REF 005.82 CHA (1). :

80.
Multivariate Public Key Cryptosystems Jintai Ding

by Ding, Jintai | Schmidt, Dieter S | Gower, Jason E.

Material type: Text Text Publication details: U S A Springer 2006Availability: Items available for reference: Not for loanCall number: REF 005.82 DIN (1). :


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha