Your search returned 50 results.

Sort
Results
1.
Cryptography and network security : principles and practice by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2023
Availability: Items available for loan: IIITD (1)Call number: 005.82 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 STA-C.

2.
Computer networking : a top-down approach by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, 2022
Availability: Items available for loan: IIITD (17)Call number: 004.678 KUR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C. Not available: IIITD: Checked out (2).

3.
A first course in network science by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Cambridge University Press, ©2020
Availability: Items available for loan: IIITD (1)Call number: CB 003.72 MEN-F.

4.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

5.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

6.
Computer networkings and internets : with internet applications by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersy : Pearson, ©2004
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 COM-C.

7.
Computer networking : a top-down approach by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2010
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C.

8.
Computer networks by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2011
Availability: Items available for loan: IIITD (4)Call number: 004.6 TAN-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 TAN-C.

9.
Learning kali linux : security testing, penetration testing, and ethical hacking by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Shroff/O'Reilly, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 MES-L. Not available: IIITD: Checked out (1).
Lists:

10.
DW 2.0 : the architecture for the next generation of data warehousing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Morgan Kaufmann, ©2008
Other title:
  • Data warehousing 2.0
Availability: Items available for loan: IIITD (1)Call number: 005.74 INM-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.74 INM-D.

11.
Cyber-assurance for the internet of things by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Wiley, ©2017
Availability: Not available: IIITD: Loan on demand (1).

12.
Computer networking : a top-down approach by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, ©2017
Availability: Items available for loan: IIITD (1)Call number: 004.678 KUR-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 004.678 KUR-C.
  (1 votes)
13.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (5)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (2).

14.
Network science by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: United Kingdom : Cambridge University Press, ©2016
Availability: Items available for loan: IIITD (1)Call number: CB 004.6 BAR-N. Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 BAR-N.

15.
Networks for computer scientists and engineers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2002
Availability: Items available for loan: IIITD (2)Call number: 004.6 ZHE-N, ...

16.
Selfish routing and the price of anarchy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge, Mass. : MIT Press, ©2005
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 ROU-S.

17.
Elements of computer networking : an integrated approach by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hyderabad : CareerMonk Publications, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 KAR-E.

18.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

19.
Multicast communication : protocols and applications by Series: Morgan Kaufmann series in networking
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: German
Publication details: Noida : Elsevier, ©2001
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 WIT-M.

20.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in