|
1.
|
NETWORK AND INTERNETWORK SECURITY PRINCIPLES AND PRACTICE
by Stallings,William. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii,462.Publisher: Prentice Hall, Englewood Cliffs 1995Availability: No items available Withdrawn (1).
|
|
2.
|
SAFETY OF COMPUTER CONTROL SYSTEMS 1991 (SAFECOMP' 91)
by Lindeberg, J. F. Material type: Book Description: xi,186.Publisher: Oxford Pergamon Press c1991Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 670.427 Sa17] (1).
|
|
3.
|
NT NETWORK SECURITY
by Strebe,Matthew, Perkins,Charles | Moncur,Michael G. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi,929.Publisher: Bpb Publications,Delhi 1998Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 ST83M] (1).
|
|
4.
|
Twofish encryption algorithm
: A 128-bit block cipher
by Schneier Bruce | Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xi, 186p.Publisher: New York John Wiley & Sons 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 T932s] (1).
|
|
5.
|
INTRUSION DETECTION
by Escamilla,Terry. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xx,348.Publisher: John Wiley, New York 1998Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 ES15I] (1).
|
|
6.
|
ELLIPTIC CURVES AND THEIR APPLICATIONS TO CRYPTOGRAPHY
by Enge,Andreas. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi,164.Publisher: Kluwer Academic Publishers, Boston 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 EN32E] (1).
|
|
7.
|
BUILDING LINUX AND OPENBSD FIREWALLS
by Sonnenreich,Wes | Yates,Tom. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxi,362.Publisher: John Wiley, New York 2000Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SO53B] (1).
|
|
8.
|
APPLIED CRYPTOGRAPHY
by Schneier,Bruce. Material type: Book Description: xviii,618.Publisher: John Wiley, New York c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 SCH58A] (1).
|
|
9.
|
NETWORK SECURITY
by Kaufman,Charlie,Perlman,Radia | Speciner,Mike. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).
|
|
10.
|
CODING THEORY AND AND CRYPTOGRAPHY
by Hankerson,D. R. Edition: 2nd Rev.Material type: Book; Format:
print
; Literary form:
not fiction
Description: x,350.Publisher: Marcel Dekker, New York 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 H195C2] (1).
|
|
11.
|
PKI
by Austin,Tom. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xviii,270.Publisher: John Wiley,New York 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 AU77P] (1).
|
|
12.
|
COMPUTER SECURITY
by Gollmann,Dieter. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xv,320.Publisher: John Wiley, Chichester 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 G582C] (1).
|
|
13.
|
DECRYPTED SECRETS
by Bauer,Kriedrich L. Edition: 2nd Rev.Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii,470.Publisher: Springer-Verlag, Berlin 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 652.8 B329D2] (1).
|
|
14.
|
INFORMATION SECURITY ARCHITECTURE
by Killmeyer,Jan. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxvii,393.Publisher: Auerbach, Boca Raton 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K557I2] (1).
|
|
15.
|
Secrets and lies
: digital security in a networked world
by Scheier, Bruce. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xv,412p.Publisher: New York John Wiley 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SCH57S] (1).
|
|
16.
|
Fundamentals of network security
by Canavan, John E. Material type: Book Description: xx, 319p.Publisher: Boston Artech House c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C16f] (1).
|
|
17.
|
CRYPTOGRAPHY AND SECURE COMMUNICATIONS
by Rhee,Man Young. Material type: Book Description: xv,504.Publisher: Mcgraw-Hill, Singapore c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 R342C] (1).
|
|
19.
|
PROGRAMMING WINDOWS SECURITY.
by Brown,Keith. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxi,580.Publisher: Addison-Wesley, Boston 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 B812P] (1).
|
|
20.
|
Staying legal
: A guide to issues and practice for users and publishers of electronic resources
by | Armstrong, C.J., Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 266p.Publisher: London Library Association Publishing 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 St29] (1).
|