Results
|
1.
|
Cryptography and network security : principles and practice by
Edition: 8th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Noida : Pearson, ©2023
Availability: Items available for loan: IIITD (1)Call number: 005.82 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 STA-C.
|
|
2.
|
Computer networking : a top-down approach by
Edition: 8th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Noida : Pearson, 2022
Availability: Items available for loan: IIITD (17)Call number: 004.678 KUR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C. Not available: IIITD: Checked out (2).
|
|
3.
|
A first course in network science by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Cambridge University Press, ©2020
Availability: Items available for loan: IIITD (1)Call number: CB 003.72 MEN-F.
|
|
4.
|
|
|
5.
|
|
|
6.
|
|
|
7.
|
Computer networking : a top-down approach by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson, ©2010
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C.
|
|
8.
|
Computer networks by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Noida : Pearson, ©2011
Availability: Items available for loan: IIITD (4)Call number: 004.6 TAN-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 TAN-C.
|
|
9.
|
|
|
10.
|
DW 2.0 : the architecture for the next generation of data warehousing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Morgan Kaufmann, ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.74 INM-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.74 INM-D.
|
|
11.
|
Cyber-assurance for the internet of things by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey : Wiley, ©2017
Availability: Not available: IIITD: Loan on demand (1).
|
|
12.
|
Computer networking : a top-down approach by
Edition: 6th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Pearson, ©2017
Availability: Items available for loan: IIITD (1)Call number: 004.678 KUR-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C.
|
|
13.
|
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (5)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (2).
|
|
14.
|
Network science by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: United Kingdom : Cambridge University Press, ©2016
Availability: Items available for loan: IIITD (1)Call number: CB 004.6 BAR-N. Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 BAR-N.
|
|
15.
|
Networks for computer scientists and engineers by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Oxford University Press, ©2002
Availability: Items available for loan: IIITD (2)Call number: 004.6 ZHE-N, ...
|
|
16.
|
Selfish routing and the price of anarchy by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Cambridge, Mass. : MIT Press, ©2005
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 ROU-S.
|
|
17.
|
|
|
18.
|
Secure multiparty computation and secret sharing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.
|
|
19.
|
|
|
20.
|
Implementing SSL/TLS using cryptography and PKI by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title: - Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.
|