Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Your search returned 37 results. Subscribe to this search

|
21. NETWORK SECURITY

by Douligeris,Christos | Serpanos,Dimitrios N.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvii,572.Publisher: John Wiley & Sons Inc., New Jersey 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N389] (1).

22. Handbook of Information Security [3-Volume Set]

by Bidgoli,Hossein [ed.].

Material type: book Book; Format: print ; Literary form: not fiction Description: 3v. (various pagings).Publisher: John Wiley & Sons Inc., New Jersey 2006Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H191 v.2] (3).

23. OFFICIAL (ISC)2 GUIDE TO THE SSCP CBK

by Contesti,Diana-Lynn.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxxiv,573.Publisher: Auerbach, Boca Raton 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 OF2] (1).

24. TRUST AND REPUTATION FOR SERVICE-ORIENTED ENVIRONMENTS

by Chang,Elizabeth,Dillon,Tharam | Hussain,Farookh K.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix,349.Publisher: John Wiley And Sons Ltd., Chichester 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 C362T] (1).

25. Optimizing and testing WLANs : proven techniques for maximum performance

by Alexander,Tom.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiv, 253p.Publisher: Amsterdam Elsevier 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 006.6 Al26o] (1).

26. Netcat power tools

by | Kanclirz, Jan, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiv, 260p.Publisher: U.S.A. Syngress Publishing 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N38] (1).

27. Network security : know it all

by Joshi, James... [Et.Al].

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii, 350p.Publisher: Amsterdam Elsevier 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N389] (1).

28. A multidisciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxv, 322p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 M699m] (1).

29. Cognitive radio networking and security : a game-theoretic view

by Liu, K.J. Ray | Wang, Beibei.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi, 601p.Publisher: Cambridge Cambridge University Press 2011Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.384 L74c] (1).

30. Physical-layer security

by Bloch, Matthieu | Barros, Jao.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi, 329p.Publisher: Cambridge Cambridge University Press 2011Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 B62p] (1).

31. Communication system security

by Chen, Lidong | Gong, Guang.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix, 730p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38928 C42c] (1).

32. Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure

by Knapp, Eric D | Samani, Raj, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxii, 202p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.31028558 K727a] (1).

33. Handbook of SCADA / control systems security

by | Radvanovsky, Robert, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxvii, 355p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H191] (1).

34. Computer and information security handbook

by | Vacca, John R, Ed.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxviii, 1171p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C739i2] (1).

35. Network aware security for group communications

by Sun, Yan | Trappe, Wade.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvii, 304p.Publisher: New York Springer 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 Su71n] (1).

36. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY

by Bart De Decker | Decker,Bart De | .

Description: xi,202,1 & 2.Publisher: Kluwer Academic Publishers,Boston 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 AD95A] (1).

37. Secure computer and network systems: modeling, analysis and design

by Ye, Nong.

Description: xvii.Publisher: John Wiley And Sons Ltd., Chichester 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 Y3s] (1).

Powered by Koha