Your search returned 63 results.

Sort
Results
21.
22.
Wireless networks : multiuser detection in cross-layer design by Series: Information technology--transmission, processing, and storage
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Springer, ©2005
Availability: Items available for loan: IIITD (4)Call number: 621.382 DET-W, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 621.382 DET-W.

23.
Wireless ad hoc networking : personal-area, local-area, and the sensory-area networks by Series: Wireless networks and mobile communications series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach Publications, c2007
Availability: Items available for loan: IIITD (2)Call number: 004.68 WU-W, ...

24.
Game theory in wireless and communication networks : theory, models, and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge, UK ; New York : Cambridge University Press, 2012
Availability: Items available for loan: IIITD (1)Call number: REF 621.384 HAN-G.

25.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

26.
Graphs and algorithms in communication networks : studies in broadband, optical, wireless and ad hoc networks by Series: Texts in theoretical computer science. an eatcs series ; 3214
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2009
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 KOS-G.

27.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

28.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

29.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

30.
Energy efficient distributed computing systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 ZOM-E.

31.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

32.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

33.
Principles and practices of interconnection networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : Morgan Kaufmann Publishers, ©2004
Availability: Items available for loan: IIITD (1)Call number: REF 004.65 DAL-P.

34.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
35.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

36.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

37.
Human-computer interaction by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi PHI Learning ©2015
Availability: Not available: IIITD: Loan on demand (1).

38.
Data communication and computer networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi PHI Learning ©2014
Availability: Not available: IIITD: Loan on demand (1).

39.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

40.
Multicast communication : protocols and applications by Series: Morgan Kaufmann series in networking
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: German
Publication details: Noida : Elsevier, ©2001
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 WIT-M.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in