Results
|
41.
|
|
|
42.
|
|
|
43.
|
|
|
44.
|
|
|
45.
|
Digital fortress by
Material type: Text; Literary form:
Novels
Publication details: London : Corgi Books, ©2004
Availability: Items available for loan: IIITD (2)Call number: F BRO-D, ...
|
|
46.
|
|
|
47.
|
The craft of system security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
|
|
48.
|
|
|
49.
|
|
|
50.
|
|
|
51.
|
Malware, rootkits & botnets beginner's guide by
Material type: Text; Format:
available online
; Literary form:
Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 ELI-M, ...
|
|
52.
|
|
|
53.
|
|
|
54.
|
Programming for mobile and remote computers by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Dreamtech, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.133 THA-P.
|
|
55.
|
Secure multiparty computation and secret sharing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.
|
|
56.
|
|
|
57.
|
Computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Chichester : Wiley, ©1999
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.
|
|
58.
|
|
|
59.
|
|
|
60.
|
|