Results
1.
Image from Amazon.com
Handbook of applied cryptography by
Publication details: New York CRC 1997 1997
Availability: Items available for loan: Main Library (1)Location, call number: Reference Section 005.82MEN . Items available for reference: Main Library: Not for loan (2)Location, call number: Reference Section 005.82MEN, .. .
star rating
Average : 0.0 out of 5 stars
2.
Image from Amazon.com
Security+ guide to network security fundamentals by
Edition: 2nd
Publication details: Boston Thomson 2005 2005
Availability: Items available for loan: Main Library (2)Location, call number: Reference Section 005.82CIA, .. .
star rating
Average : 0.0 out of 5 stars
3.
Image from Amazon.com
Cryptography and lattices by
Publication details: New York Springer 2001 2001
Availability: Items available for loan: Main Library (1)Location, call number: Reference Section 005.82CRY .
star rating
Average : 0.0 out of 5 stars
4.
Image from Amazon.com
Trusted information The new decade challenge by
Publication details: London Kluwer Academic 2001 2001
Availability: Items available for loan: Main Library (1)Location, call number: Reference Section 005.8TRU .
star rating
Average : 0.0 out of 5 stars
5.
Image from Amazon.com
6.
Image from Amazon.com
7.
Image from Amazon.com
8.
Image from Amazon.com
Hacking exposed : network security secrets & solutions by
Edition: 4th ed.
Publication details: Osborne: McGraw-Hill, 2003
Availability: Items available for loan: Main Library (2)Location, call number: Reference Section 005.8MCC, .. .
star rating
Average : 0.0 out of 5 stars
9.
Image from Amazon.com
Microsoft encyclopedia of security by
Publication details: New Delhi: Prentice Hall, 2003
Availability: Items available for reference: Main Library: Not for loan (1)Location, call number: Reference Section 005.8TUL .
star rating
Average : 0.0 out of 5 stars
10.
Image from Amazon.com
11.
Image from Amazon.com
Introduction to cryptography by
Publication details: New York Springer 2001 2001
Availability: Items available for loan: Main Library (1)Location, call number: Reference Section 005.82BUC .
star rating
Average : 0.0 out of 5 stars
12.
Image from Amazon.com
13.
Image from Amazon.com
Cryptography theory and practice by
Edition: 2nd
Publication details: New York Chapman & Hall 2002 2002
Availability: Items available for loan: Main Library (1)Location, call number: Reference Section 005.82STI .
star rating
Average : 0.0 out of 5 stars
14.
Image from Amazon.com
An introduction to cryptography by
Publication details: New York Chapman & Hall 2001 2001
Availability: Items available for loan: Main Library (2)Location, call number: Reference Section 005.82MOL, .. .
star rating
Average : 0.0 out of 5 stars
15.
Image from Amazon.com
Computer ethics by
Publication details: Delhi Pearson 2001 2001
Availability: Items available for loan: Main Library (2)Location, call number: Lending Section 005.8JOH, .. .
star rating
Average : 0.0 out of 5 stars
16.
Image from Amazon.com
17.
Image from Amazon.com
18.
The computer virus protection handbook by
Publication details: New Delhi BPB 1990 1990
Availability: Items available for loan: Main Library (1)Location, call number: Lending Section 005.8HAY . Makandura Library (3)Location, call number: Lending Section 005.84HAY, .. .
star rating
Average : 0.0 out of 5 stars
19.
Image from Amazon.com
Configuring netscreen firewalls by
Publication details: Mumbai Shroff 2005 2005
Availability: Items available for loan: Main Library (2)Location, call number: Lending Section 005.8CON, .. .
star rating
Average : 0.0 out of 5 stars
20.
Image from Amazon.com
Data communications and network security by
Publication details: Boston McGraw-Hill 2007 2007
Availability: Items available for loan: Main Library (1)Location, call number: Lending Section 005.8CAR .
star rating
Average : 0.0 out of 5 stars