Refine your search

Your search returned 407 results.

Sort
Results
61.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

62.
Network security essentials : applications and standards by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

63.
Graphs and algorithms in communication networks : studies in broadband, optical, wireless and ad hoc networks by Series: Texts in theoretical computer science. an eatcs series ; 3214
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2009
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 KOS-G.

64.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

65.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

66.
From counterculture to cyberculture : Stewart Brand, the Whole Earth Network, and the rise of digital utopianism by
Material type: Text Text; Format: print ; Nature of contents: biography; Literary form: Not fiction
Publication details: Chicago : University of Chicago Press, 2006
Other title:
  • Stewart Brand, the Whole Earth Network, and the rise of digital utopianism
Availability: Items available for loan: IIITD (1)Call number: 303.48 TUR-F.

67.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

68.
Energy efficient distributed computing systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 ZOM-E.

69.
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, c1999
Availability: Items available for loan: IIITD (1)Call number: 004.62 STA-S.

70.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

71.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

72.
An introduction to client/server computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : New Age international, ©2009
Availability: Items available for loan: IIITD (1)Call number: 004.36 YAD-I.

73.
The structure and dynamics of networks by Series: Princeton studies in complexity
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : New Age, c2006
Availability: Items available for loan: IIITD (1)Call number: 004.6 NEW-S.

74.
Data communications and networking by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw-Hill, ©2013
Availability: Items available for loan: IIITD (1)Call number: 004.6 FOR-D.

75.
Network security through data analysis : building situational awareness by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: Shroff publication ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 COL-N.

76.
Principles and practices of interconnection networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : Morgan Kaufmann Publishers, ©2004
Availability: Items available for loan: IIITD (1)Call number: REF 004.65 DAL-P.

77.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
78.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

79.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

80.
Computer networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: S.K Kataria & Sons, ©2010
Availability: Items available for loan: IIITD (1)Call number: 004.6 SHA-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in