Your search returned 28 results.

Sort
Results
21.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

22.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

23.
Network security and cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Cengage Learning, ©2010
Availability: Not available: IIITD: Loan on demand (1).

24.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (6)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (1).

25.
Cyber-assurance for the internet of things by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Wiley, ©2017
Availability: Not available: IIITD: Loan on demand (1).

26.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

27.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

28.
Cryptography and network security by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chennai : McGraw Hill, ©2023
Availability: Items available for loan: IIITD (1)Call number: CBIA 005.82 KAH-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in