|
1.
|
Foundations of Security : What Every Programmers Needs to Know
by Daswani, Neil | Kesavan, Anita | Daswani, Neil. Edition: 1st ed.Material type: Book Publisher: USA : Apress, 2007Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: DAS] (1), Reference Section [Call number: DAS (Shelf -13C)] (1).
|
|
2.
|
Cryptography and Network Security : Principles and Practice
by Stallings, William. Edition: 5th Edition.Material type: Book Publisher: New Delhi Pearson 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (2), Reference Section [Call number: 004.678STA Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 004.678STA] (1).
|
|
3.
|
Network Security and Cryptography
by Menezes, Bernard. Material type: Book Publisher: India Cenage Learning 2011Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678MEN (Shelf - 13C)] (1).
|
|
4.
|
Cryptography and Network Security : principles and practices
by Stallings, William. Edition: 3rd ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (5).
|
|
5.
|
Cryptography and Network Security /
by Forouzan, Behrouz A. Material type: Book Publisher: [S.l.] : Tata McGraw-Hill, 2016Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678FOR] (4), Seminar Library, Information Technology [Call number: 004.678FOR] (1).
|
|
6.
|
Cryptography and Network Security: principles and practices
by Stallings, William | Tahiliani, Mohit P. Edition: 4th ed.Material type: Book Publisher: [S.l.] : Prentice Hall, 2005Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (34), Reference Section [Call number: 004.678STA] (2). Checked out (2).
|
|
7.
|
Coding for Data and Computer Communications /
by Salomon, David. Edition: 2005th ed.Material type: Book Publisher: [S.l.] : Springer, 2005Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.6SAL] (1).
|
|
8.
|
Cryptography and Network Security /
by Forouzan, Behrouz A. Edition: 3rd ed.Material type: Book Publisher: [S.l.] : Tata McGraw-Hill, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 006.6FOR] (5), Library for Girls [Call number: 004.6FOR] (1).
|
|
9.
|
Cryptography and Network Security : Principles and Practices
by Stallings, Willam | Tahiliani, Mohit P. Edition: 6th ed.Material type: Book Publisher: New Delhi : Pearson, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (7), Library for Girls [Call number: 005.8STA] (1).
|
|
10.
|
Quantum cryptography [electronic resource] : potentially perfect security.
by ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
11.
|
Security [electronic resource] : secrets, intruders and ID tags.
by ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: [Boston] : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
12.
|
Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
by Dwivedi, Himanshu | ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Indianapolis, Ind. ; [Chichester] : Wiley, c2004Other title: Implementing secure shell.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
13.
|
ExamWise for CIW security professional [electronic resource] : exam 1D0-470 / Chad M. Bayer.
by Bayer, Chad M | ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Friendswood, Tex. : TotalRecall Publications, Inc., c2003Other title: Exam Wise for CIW security professional | CIW security professional.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
14.
|
Outsourcing information security [electronic resource] / C. Warren Axelrod.
by Axelrod, C. Warren | ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
15.
|
Quantum cryptography [electronic resource] : potentially perfect security.
by ebrary, Inc. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: HEC Digital Library (1).
|
|
16.
|
Secure multi-party computation /
by Prabhakaran, Manoj | Sahai, Amit. Material type: Book Online access: Click here to access online Availability: Items available for loan: HEC Digital Library [Call number: 005.8/2] (1).
|