Refine your search

Your search returned 104 results.

Sort
Results
1.
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
  (1 votes)
2.
Fundamentals of computer security by Series: Monographs in theoretical computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2003
Availability: Items available for loan: IIITD (2)Call number: 005.8 PIE-F, ...

3.
Core security patterns : best practices and strategies for J2EE, web services, and identity management by Series: Prentice Hall PTR core series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2006
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 STE-C.

4.
Network security essentials : applications and standards by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

5.
Cryptography and network security by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Pearson, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.82 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 STA-C. Not available: IIITD: Checked out (1).

6.
Cryptography and network security by Series: McGraw-Hill Forouzan networking series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2008
Availability: Items available for loan: IIITD (2)Call number: 005.82 FOR-F, ...

7.
19 Deadly sins of software security : programming flaws and how to fix them by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tata McGraw Hill, New Delhi : 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 HOW-D.

8.
Secure coding : principles and practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : SPD, 2003
Availability: Items available for loan: IIITD (5)Call number: 005.8 GRA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 GRA-S.

9.
Introduction to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, ©2006
Online access:
Availability: Items available for loan: IIITD (8)Call number: 005.8 BIS-I, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-I.

10.
Web hacking attack and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Pearson, 2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 MCC-W.

11.
Internet cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, c2000
Availability: Items available for loan: IIITD (1)Call number: 005.82 SMI-I.

12.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Not available: IIITD: Checked out (1).
  (1 votes)
13.
Security for telecommunications networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Springer, 2008
Availability: Items available for loan: IIITD (2)Call number: 005.8 TRA-S, ...

14.
Modern cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2004
Availability: Items available for loan: IIITD (3)Call number: 005.82 MAO-M, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 MAO-M. Not available: IIITD: Checked out (1).

15.
Introduction to modern cryptography by Series: Chapman & Hall/CRC cryptography and network security
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : Chapman & Hall/CRC, c2008
Availability: Items available for loan: IIITD (1)Call number: 005.82 KAT-I. Not available: IIITD: Checked out (1).

16.
Digital watermarking and steganography by Series: The Morgan Kaufmann series in multimedia information and systems | The Morgan kaufmann series in computer security
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Morgan Kaufmann, ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 COX-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 COX-D.

17.
Wireless and mobile network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : TMH, 2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 VEN-W.

18.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (4)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N.

19.
Cryptography and network security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (2)Call number: 005.8 FOR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C.

20.
Embedded java security : security for mobile devices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Springer, ©2007
Availability: Items available for loan: IIITD (1)Call number: 005.8 DEB-E.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in