|
1.
|
Wireless Data Technologies /
by Dubendorf, Vern A. Edition: 1st ed.Material type: Book Publisher: [S.l.] : Wiley, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 621.382DAB (Shelf - 57A)] (1).
|
|
2.
|
Computer Security: art and science
by Bishop, Matt. Material type: Book Publisher: Delhi Pearson Education, Singapore, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8BIS Shelf - 13C)] (1).
|
|
3.
|
The Process of Network Security : designing and managing a safe network
by Wadlow, Thomas A. Material type: Book Publisher: Harlow, Englind Addison-Wesley Professional, 2000Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8WAD Shelf - 13C)] (1).
|
|
4.
|
Computer Security : Prinicples and Practice
by Stallings, William | Brown, Lawrie. Material type: Book Publisher: New Delhi Pearson Education, 2010Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (2), Stacks area [Call number: 005.8STA] (1), Reference Section [Call number: 005.8STA (Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 005.8STA] (1).
|
|
5.
|
Inside Network Perimeter Security
by Stephen Northcutt. Material type: Book Publisher: New Delhi Pearson Education 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.822NOR (Shelf - 13C)] (1).
|
|
6.
|
Software Testing : principles and practices
by Desikan, Srinivasan | Desikan, Srinivasan. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Pearson Education 2009Online access: eBook Availability: Items available for loan: Reference Section [Call number: 005.14DES (Shelf -06B)] (1).
|
|
7.
|
Internet Security Secrets /
by Vacca, John R. Material type: Book Publisher: IDG BOOKS World wide,Inc. 1996Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678VAC Shelf - 13C)] (1).
|
|
8.
|
Software Security Engineering: a guide for project managers
by Allen, Julia H | Barnum, Sean J | Ellison, Robe. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: [S.l.] : Addison-Wesley Professional, 2008Online access: eBook Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8ALL] (2), Seminar Library, Information Technology [Call number: 005.8ALL] (3).
|
|
9.
|
Cryptography and Network Security : Principles and Practice
by Stallings, William. Edition: 5th Edition.Material type: Book Publisher: New Delhi Pearson 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (2), Reference Section [Call number: 004.678STA Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 004.678STA] (1).
|
|
10.
|
Network Security Essentials: Applications and Standards
by Stallings, William. Edition: 3rd editionMaterial type: Book Publisher: New Delhi Pearson, 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (7), Reference Section [Call number: 004.6STA (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 004.678STA] (3).
|
|
11.
|
Network Security and Cryptography
by Menezes, Bernard. Material type: Book Publisher: India Cenage Learning 2011Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678MEN (Shelf - 13C)] (1).
|
|
12.
|
Network Security: Private Communication in a public world
by Kaufman Charlie | Perlman, Radia | Speciner, Mike. Material type: Book Publisher: New Delhi Pearson Education 2008Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004COH] (7), Reference Section [Call number: 004COH (Shelf - 13C)] (3).
|
|
13.
|
Wireless Security
by Osterhage, Wolfgang. Material type: Book Publisher: UK CRC Press, 2012Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8OST (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 621.384OST] (1).
|
|
14.
|
Network Security Essentials : Applications and Standards
by Stallings, William. Edition: 4th ed.Material type: Book Publisher: New Delhi Pearson Education 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (7), Reference Section [Call number: 005.8STA (Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 005.8STA] (1). Checked out (1).
|
|
15.
|
Principles of Information Security
by Whitman, Michael E | Mattord, Herbert J. Edition: 4th ed.Material type: Book Publisher: New Delhi Cengage Learning, 2013Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.823WHI Shelf - 13C)] (1). Checked out (1).
|
|
16.
|
Cryptography and Network Security : principles and practices
by Stallings, William. Edition: 3rd ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (5).
|
|
17.
|
Principles of Information Security /
by Whitman, Michael E | Mattord, Herbert J. Edition: 1st ed.Material type: Book Publisher: [S.l.] : Course Technology, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 658.472WHI (Shelf - 84E)] (1).
|
|
18.
|
Introduction to Computer Security /
by Bishop, Matt | Computers--Access control. Material type: Book Publisher: New Delhi Pearson 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.6008BIS] (1), Seminar Library, Information Technology [Call number: 005.8BIS] (3), Reference Section [Call number: 005.8BIS (Shelf - 13C)] (2).
|
|
19.
|
Principles of Computer Security, Comptia Security+ and Beyond
by Conklin, Wm Arthur | White, Gregory | Cothren, Chuck. Edition: 2nd ed.Material type: Book Publisher: [S.l.] : McGraw-Hill Osborne Media, 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8CON] (2).
|
|
20.
|
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
by Anonymous. Edition: 3rd Ed:Material type: Book Publisher: India: Techmedia, 2001Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8TEC (Shelf - 13C)] (1).
|