|
21.
|
Hands-on ethical hacking and network defense /
by Simpson, Michael T | Co. Edition: . [SMaterial type: Book Publisher: 48 Cengage Learning, 2000Online access: Click here to access online Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8SIM] (1).
|
|
22.
|
Cryptography and Network Security /
by Forouzan, Behrouz A. Material type: Book Publisher: [S.l.] : Tata McGraw-Hill, 2016Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678FOR] (4), Seminar Library, Information Technology [Call number: 004.678FOR] (1).
|
|
23.
|
Network Security and Management
by Singh, Brijendra. Edition: 3rd ed.Material type: Computer file; Format:
electronic
Publisher: New Delhi PHI Learning Private Limited, 2012Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8SIN (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 005.8SIN] (1).
|
|
24.
|
Cryptography and Network Security: principles and practices
by Stallings, William | Tahiliani, Mohit P. Edition: 4th ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2005Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (34), Reference Section [Call number: 004.678STA] (2). Checked out (2).
|
|
25.
|
Network Security : private communication in a public world
by Kaufman, Charlie | Perlman, Radia | Speciner, Mike. Edition: 2nd ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 005.8KAU] (1).
|
|
26.
|
Inside Network Security Assessment :
by Gregg, Michael | Kim, David. Material type: Book Publisher: [S.l.] : Sams Publishing, 2005Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678GRE] (1).
|
|
27.
|
Internet security :
by Speed, Tim | Ellis, Juanita. Edition: 1st ed.Material type: Book Publisher: [S.l.] : Digital Press, 2003Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678SPE] (1).
|
|
28.
|
Security in Computing /
by Pfleeger. Edition: 4th ed.Material type: Book Publisher: New Delhi Pearson 2013Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8PFL] (2), Library for Girls [Call number: 005.8PFL] (1).
|
|
29.
|
Computer Forensics and Cyber Crime :
by Britz, Marjie T | Britz, Marjie. Edition: 2nd ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2008Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8BRI] (2).
|
|
30.
|
Information Security: the complete reference
by Ousley, Mark Rhodes. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi McGraw Hill 2013Online access: eBook Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8OUS] (1).
|
|
31.
|
Security in Computing
by Pfeeger C P | Margulies, Jonathan - Pfleeger, Shari Lawrence. Material type: Book Publisher: New Delhi Pearson Education 2013Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8PFI] (1).
|
|
32.
|
Analyzing Computer Security :
by Pfleeger, Charles P. Edition: 1st ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8PFL] (1), Library for Girls [Call number: 005.8PFL] (1).
|
|
33.
|
Building Secure Software /
by Mcgraw, [ MEI ] John Viega Gary | Viega, John. Material type: Book Publisher: [S.l.] : Machinery Industry Press, 2013Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.1221VIE] (1).
|
|
34.
|
Computer Security Penetration Testing
by Basta, A. Material type: Book Publisher: Japan: Cengage Learning, 2008Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8BAS] (2).
|
|
35.
|
Cryptography and Network Security /
by Forouzan, Behrouz A. Edition: 3rd ed.Material type: Book Publisher: [S.l.] : Tata McGraw-Hill, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 006.6FOR] (5), Library for Girls [Call number: 004.6FOR] (1).
|
|
36.
|
Cryptography and Network Security : Principles and Practices
by Stallings, Willam | Tahiliani, Mohit P. Edition: 6th ed.Material type: Book Publisher: New Delhi : Pearson, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (7), Library for Girls [Call number: 005.8STA] (1).
|
|
37.
|
Computer Security Fundamentals /
by Easttom,Chuck. Edition: 2nd ed.Material type: Book Publisher: New Delhi: Pearson, 2015Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8EAS (Shelf - 13C)] (3).
|