Your search returned 44 results.

1.
Cryptography and Network Security Mohammad Amjad

by Amjad, Mohammad.

Material type: Text Text Publication details: New Delhi IK Pub. 2015Availability: Items available for loan: Call number: 005.8 AMJ (2).

2.
Basics of Network Security, Firewalls and VPNs NIIT

by NIIT.

Material type: Text Text Publication details: New Delhi Prentice Hall of India 2005Availability: Items available for loan: Call number: 005.8 NII (7).

3.
Cisco Security Bible by Rajesh Kumar Sharma and Rashim Mogha

by Sharma, Rajesh Kumar | Mogha, Rashim.

Material type: Text Text Publication details: New Delhi: IDG Books India, 2002Availability: Items available for loan: Call number: 005.8 SHA (1).

4.
Comparing, Designing and Developing VPNs by Mark Lewis

by Lewis, Mark.

Material type: Text Text Publication details: Indianapolis, U.S.A. Cisco Press 2006Availability: Items available for reference: Not for loanCall number: REF 005.8 LEW (1). :

5.
Computer Intrusion Detection and Network Monitoring: a statistical viewpoint David J. Marchette

by Marchette, David J.

Material type: Text Text Publication details: Springer Verlag 2001Availability: Items available for reference: Not for loanCall number: REF 005.8 MAR (1). :

6.
Cryptography and Network Security: principle and practices Wiliam Stallings

by Stallings, William.

Material type: Text Text Publication details: New Delhi Pearson Education Asia 2005Availability: Items available for loan: Call number: 005.8 STA (4).

7.
Cryptography and Network Security: principle and practices by Wiliam Stallings

by Stallings, William.

Edition: 4th ed.Material type: Text Text Publication details: New Delhi Pearson Education Asia 2005Availability: Items available for loan: Call number: 005.8 STA (1).

8.
Designing and Implementing : linux firewall and QOS using netfilter, iproute2, NAT, and L7-filter Lucian Gheorghe

by Gheorghe, Lucian.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 GHE (3).

9.
Fundamentals of Network security by Eric Maiwald

by Maiwald, Eric.

Material type: Text Text Publication details: New Delhi DreamTech 2006Availability: Items available for loan: Call number: 004.606 MAI (6).

10.
IT Security Project Management by Susan Snedaker

by Snedaker, Susan | Rogers, Russ.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 SNE (5).

11.
Linux Network Security Peter G. Smith

by Smith, Peter G.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: 005.8 SMI (7). Damaged (1).

12.
Linux Network Security Peter G. Smith

by Smith, Peter G.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: CDR 005.8 SMI (2).

13.
Managing and Securing a CISCO SWAN Structured Wireless Aware Network by David Wall ... [et al.].

by Wall, David | Jing, Youhao | Kanclirz, Jan.

Material type: Text Text Publication details: Rockland Syngress Publishing, Inc 2004Availability: Items available for loan: Call number: 005.8 WAL (1).

14.
Mastering Network Security by Chris Brenton and Cameron Hunt

by Brenton, Chris | Hunt, Cameron.

Edition: 2nd Ed.Material type: Text Text Publication details: New Delhi BPB Publications 2003Availability: Items available for loan: Call number: 005.8 BRE (2).

15.
Network Security: a hacker's perspective Ankit Fadia

by Fadia, Ankit.

Material type: Text Text Publication details: Delhi Macmillan India Pvt Ltd 2005Availability: Items available for loan: Call number: 005.8 FAD (3).

16.
Network Security: a practical approach Jan L. Harrington

by Harrington, Jan L.

Material type: Text Text Publication details: San Francisco Morgan Kaufmann Publishers 2006Availability: Items available for loan: Call number: 005.8 HAR (1).

17.
Network Security and Management by Brijendra Singh

by Singh, Brijendra.

Material type: Text Text Publication details: New Delhi Prentice Hall of India 2007Availability: Items available for loan: Call number: 005.8 SIN (3).

18.
Network Security Bible edited by Eric Cole

by Cole, Eric | Conley, James W | Krutz, Ronald.

Material type: Text Text Publication details: Indiana Wiley Publishing 2005Availability: Items available for loan: Call number: 005.8 COL (3).

19.
Network Security: first step Tom Thomas

by Thomas, Tom.

Material type: Text Text Publication details: New Delhi Pearson Education Asia 2004Availability: Items available for loan: Call number: 004.606 THO (7).

20.
Network Security for Windows, UNIX and linux Networks: hack attacks denied by John Chirillo

by Chirillo, John.

Edition: 2nd ed.Material type: Text Text Publication details: New Delhi: Wiley Dreamtech India, 2002Availability: Items available for loan: Call number: 005.8 CHI (2).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha