Your search returned 65 results.

1.
Cyber Security: understanding cyber crimes, computer forensics and legal perspectives Nina Godbole

by Godbole, Nina | Belapure, Sunit.

Material type: Text Text Publication details: New Delhi Wiley India 2011Availability: Items available for loan: Call number: CDR 005.8 GOD (7).

2.
Abusing the Internet of things : blackouts, freakouts, and stakeouts Nitesh Dhanjani

by Dhanjani, Nitesh.

Material type: Text Text Publication details: New Delhi O'Reilly 2018Availability: Items available for loan: Call number: 005.8 DHA (2).

3.
Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Vijay Kumar Velu

by Velu, Vijay Kumar.

Edition: 2nd ed.Material type: Text Text Publication details: Mumbai PACKT 2017Availability: Items available for loan: Call number: 005.8 VEL (1).

4.
Advances in Security and Payment Methods for Mobile Commerce by Wen-Chen Hu

by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei.

Material type: Text Text Publication details: London IDEA Group Publishing 2004Availability: Items available for loan: Call number: 658.8 HUW (1).

5.
Cisco Pix Firewalls Configure, Manage and Troubleshoot by Thorsten Behrens

by Behrens, Thorsten | Dubrawsky, Ido | Browne, Brian.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 BEH (2).

6.
Code Hacking : a developer's guide to Network Security Richard Conway

by Conway, Richard | Cordingley, Julian.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2004Availability: Items available for loan: Call number: 005.8 CON (1).

7.
Computer Network Security by Joseph Migga Kizza

by Kizza, Joseph Migga.

Material type: Text Text Publication details: New Delhi Springer (India) Pvt Ltd 2005Availability: Items available for loan: Call number: 005.8 KIZ (2).

8.
Current Security Management and Ethical Issues of Information Technology Edited by Rasool Azari

by Azari, Rasool.

Material type: Text Text Publication details: London IRM Press 2003Availability: Items available for loan: Call number: 005.8 AZA (1).

9.
Data Networks: routing, security and performance optimization by Tony Kenyon

by Kenyon, Tony.

Material type: Text Text Publication details: Amsterdam Digital Press 2002Availability: Items available for loan: Call number: 004.6 KEN (1).

10.
Defense and Detection Strategies against Internet Worms by Jose Nazario

by Nazario, Jose.

Material type: Text Text Publication details: Bostan Artech House 2004Availability: Items available for reference: Not for loanCall number: REF 005.8 NAZ (1). :

11.
Firewall Architecture for the Enterprise by Norbert Pohlmann

by Pohlmann, Norbert | Crothers, Tim.

Material type: Text Text Publication details: New Delhi Firewall Media 2004Availability: Items available for loan: Call number: 005.8 POH (1).

12.
Hacking: the Art of Exploitation Jon Erickson

by Erickson, Jon.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2003Availability: Items available for loan: Call number: 005.8 ERI (1).

13.
How to Cheat Securing Your Network by Ido Dubrawsky ... [et al.].

by Dubrawsky, Ido | Crayton, Chris | Cross, Mike.

Material type: Text Text Publication details: Rockland Syngress Publishing, Inc 2007Availability: Items available for loan: Call number: 005.8 DUB (1).

14.
ICT Futures: delivering pervasive, real-time and secure services by Paul Warren

by Warren, Paul | Brown, David | Davies, John.

Material type: Text Text Publication details: England John Wiley & Sons 2008Availability: Items available for reference: Not for loanCall number: REF 384 WAR (1). :

15.
Introduction to Network Security by Douglas Jacobson

by Jacobson, Douglas.

Material type: Text Text Publication details: New York CRC Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 JAC (1). :

16.
ISA Server 2004 Thomas W. Shinder

by Shinder, Thomas W | Shinder, Debra Littlejohn.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: 005.821 SHI (1).

17.
Local Area Network: management, design and security Arne Mikalsen

by Mikalsen, Arne | Borgesen, Per.

Material type: Text Text Publication details: Singapore John Wiley & Sons 2002Availability: Items available for loan: Call number: 004.68 MIK (1).

18.
Multicast and Group Security Thomas Hardjono

by Hardjono, Thomas | Dondeti, Lakshminath R.

Material type: Text Text Publication details: Bostan Artech House 2003Availability: Items available for reference: Not for loanCall number: REF 005.8 HAR (1). :

19.
Network Interdiction and Stochastic Programming by David L. Woodruff

by Woodruff, David L.

Material type: Text Text Publication details: London Kluwer Academic Publishers 2003Availability: Items available for reference: Not for loanCall number: REF 519.77 WOO (1). :

20.
Network Security Hacks Andrew Lockhart

by Lockhart, Andrew.

Edition: 2nd.Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2007Availability: Items available for loan: Call number: 005.8 LOC (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha