FEEDBACK Smiley face

Your search returned 55 results. Subscribe to this search

|
1. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

2. Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

3. Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

4. Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

5. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Redmond, Wash. : Microsoft Press, 2003Online access: Contributor biographical information | Publisher description Availability:
Items available for reference: IIITD [REF 005.803 TUL-M] (1).

6. Computer networks

by Tanenbaum, Andrew S.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, ©2003Availability: Items available for loan: IIITD [004.6 TAN-C] (12).
Checked out (1).

7. Computer networking : a top-down approach featuring the internet

by Kurose, James F | Ross, Keith W.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Pearson, ©2005Availability: Items available for loan: IIITD [004.678 KUR-C] (12).
Items available for reference: IIITD [REF 004.678 KUR-C] (1).
Checked out (1).

8. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.82 FOR-F] (1).
Items available for reference: IIITD [REF 005.82 FOR-F] (1).

9. UNIX network programming

by Stevens, W. Richard.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : PHI, c1990Availability: Items available for loan: IIITD [005.43 STE-U] (1).
Items available for reference: IIITD [REF 005.43 STE-U] (1).

10. UNIX network programming : Interprocess communications, vol II

by Stevens, W. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, ©1999Availability:
Items available for reference: IIITD [REF 005.43 STE-U] (1). Checked out (1).

11. Data and computer communications

by Stallings, William.

Edition: 8th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007Availability: Items available for loan: IIITD [004.6 STA-D] (2).
Items available for reference: IIITD [REF 004.6 STA-D] (1).

12. Interconnection networks : an engineering approach

by Duato, Jose | Yalamanchili, Sudhakar | Ni, Lionel.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Morgan Kaufmann, 2003Availability: Items available for loan: IIITD [004.6 DUA-I] (1).
Items available for reference: IIITD [REF 004.6 DUA-I] (1).

13. Digital business security development : management technologies

by Kerr, Don | Gammack, John G | Bryant, Kay 1954-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Business Science Reference, c2011Availability: Items available for loan: IIITD [REF 005.8 KER-D] (1).

14. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : PHI, c2002Availability: Items available for loan: IIITD [005.8 KAU-N] (3).
Items available for reference: IIITD [REF 005.8 KAU-N] (1).
Checked out (1).

15. Cryptography and network security

by Forouzan, Behrouz A | Mukhopadhyay, Debdeep.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2010Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 FOR-C] (2).
Items available for reference: IIITD [REF 005.8 FOR-C] (1).

16. A multidisciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IIITD [REF 005.8 MJO-M] (1).

17. Introduction to security and network forensics

by Buchanan, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, FL : CRC Press, ©2011Availability: Items available for loan: IIITD [REF 005.8 BUC-I] (1).

18. Communication networking : an analytical approach

by Kumar, Anurag | Manjunath, D | Kuri, Joy.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi: Elsevier, c2004Online access: Table of contents | Publisher description Availability: Items available for loan: IIITD [004.65 KUM-C] (1).
Items available for reference: IIITD [CBIA 004.65 KUM-C] (1).

19. Communication systems : the state of the art : IFIP 17th World Computer Congress, TC6 stream on communication systems, the state of the art, August 25-30, 2002, Montréal, Québec, Canada

by Chapin, Lyman | (17th : IFIP World Computer Congress Montréal, Québec) 2002 : | Chapin, A. Lyman.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Kluwer Academic Publishers, c2002Availability: Items available for loan: IIITD [621.382 CHA-C] (1).
Items available for reference: IIITD [REF 621.382 CHA-C] (1).

20. Wireless networks : multiuser detection in cross-layer design

by Comaniciu, Cristina | Mandayam, Narayan B | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Springer, ©2005Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [621.382 DET-W] (4).
Items available for reference: IIITD [REF 621.382 DET-W] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in