FEEDBACK Smiley face

Your search returned 44 results. Subscribe to this search

|
1. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

2. Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

3. Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

4. Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

5. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Redmond, Wash. : Microsoft Press, 2003Online access: Contributor biographical information | Publisher description Availability:
Items available for reference: IIITD [REF 005.803 TUL-M] (1).

6. Network security essentials : applications and standards

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: IIITD [005.8 STA-N] (1).

7. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.82 FOR-F] (1).
Items available for reference: IIITD [REF 005.82 FOR-F] (1).

8. Digital business security development : management technologies

by Kerr, Don | Gammack, John G | Bryant, Kay 1954-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Business Science Reference, c2011Availability: Items available for loan: IIITD [REF 005.8 KER-D] (1).

9. Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : PHI, c2002Availability: Items available for loan: IIITD [005.8 KAU-N] (3).
Items available for reference: IIITD [REF 005.8 KAU-N] (1).
Checked out (1).

10. Cryptography and network security

by Forouzan, Behrouz A | Mukhopadhyay, Debdeep.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2010Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 FOR-C] (2).
Items available for reference: IIITD [REF 005.8 FOR-C] (1).

11. Embedded java security : security for mobile devices

by Debbabi, Mourad.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London : Springer, ©2007Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 DEB-E] (1).

12. A multidisciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IIITD [REF 005.8 MJO-M] (1).

13. Introduction to security and network forensics

by Buchanan, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, FL : CRC Press, ©2011Availability: Items available for loan: IIITD [REF 005.8 BUC-I] (1).

14. Wireless networks : multiuser detection in cross-layer design

by Comaniciu, Cristina | Mandayam, Narayan B | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Springer, ©2005Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [621.382 DET-W] (4).
Items available for reference: IIITD [REF 621.382 DET-W] (1).

15. Building secure servers with Linux

by Bauer, Michael D.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastopol, CA : O'Reilly, [2002], c2003Other title: Linux.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 BAU-B] (1).

16. Linux server security

by Bauer, Michael D.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastopol, CA : O'Reilly, ©2005Online access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: IIITD [005.8 BAU-L] (1).

17. Kerberos : the definitive guide

by Garman, Jason.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Farnham : O'Reilly, ©2003Online access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: IIITD [005.8 GAR-K] (1).

18. Apache cookbook

by Coar, Ken A. L | Bowen, Richard Cooper 1971-.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Sebastopol, CA : O'Reilly, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 COA-A] (1).

19. Computer security fundamentals

by Easttom, Chuck.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson, ©2006Availability: Items available for loan: IIITD [005.8 EAS-C] (1).

20. Computer security : principles and practice

by Stallings, William | Brown, Lawrie | Bauer, Michael D | Howard, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson Education, ©2010Availability: Items available for loan: IIITD [005.8 STA-C] (1).
Items available for reference: IIITD [REF 005.8 STA-C] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in