Results
|
|
1.
|
Applied cryptography: Protocols, algorithms, and source code in C by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.
|
|
|
2.
|
Building internet firewalls by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai O'Reilly/Shroff Publishers and Distributors 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 ZWI/B.
|
|
|
3.
|
Practical Unix and internet security by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 1999
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAR/P.
|
|
|
4.
|
Firewalls :A complete guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 GON/F.
|
|
|
5.
|
RSA security's official guide to cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BUR/R.
|
|
|
6.
|
CISCO network security little black book by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Dreamtech 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 JOE/C.
|
|
|
7.
|
|
|
|
8.
|
|
|
|
9.
|
|
|
|
10.
|
|
|
|
11.
|
Java2:Network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Addison Wesley Longman 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.133J2 PIS/J.
|
|
|
12.
|
Cryptography and network security principles and practices by
Edition: 3
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi PHI Learning 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/C.
|
|
|
13.
|
Computer security art and science by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BIS/C.
|
|
|
14.
|
Cryptography in C and C++ by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Springer 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEL/C.
|
|
|
15.
|
Web privacy with P3P by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CRA/W.
|
|
|
16.
|
Security in computing by
Edition: 3
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.
|
|
|
17.
|
Email, spam and viruses : Degunking your email, spam and viruses by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Paraglyph Press 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.84 DUN/E.
|
|
|
18.
|
Information warfare: how to survive cyber ttacks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata McGraw Hill 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 ERB/I.
|
|
|
19.
|
Gray hat hacking: The ethical hacker's handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata McGraw Hill 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HAR/G.
|
|
|
20.
|
Digital security: Concepts and cases by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hyderabad ICFAI University Press 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GUP/D.
|