|
341.
|
Pragmatic security metrics
: applying metametrics to information security
by Brotby, W. Krag | Hinson, Gary. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xviii, 494p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.472 B794p] (1).
|
|
342.
|
Secure broadcast communication in wired and wireless networks
by Perrig, Adrian | Tygar, J. D. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xix, 214p.Publisher: Boston Kluwer Academic Publishers 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38212 P428s] (1).
|
|
343.
|
Nuclear energy leadership
: lessons learned from U.S. operators
by Rogers, Mary Jo. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 179p.Publisher: Tulsa Pennwell 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 333.79240973 R632n] (1).
|
|
344.
|
Applied cyber security and the smart grid
: implementing security controls into the modern power infrastructure
by Knapp, Eric D | Samani, Raj, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxii, 202p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.31028558 K727a] (1).
|
|
345.
|
Handbook of SCADA / control systems security
by | Radvanovsky, Robert, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxvii, 355p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H191] (1).
|
|
346.
|
Photonic sensing
: principles and applications for saftey and security monitoring
by | Xiao,Gaozhi, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiv, 313p.Publisher: New Jersey John Wiley & Sons 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 681.25 P566] (1).
|
|
347.
|
Computer and information security handbook
by | Vacca, John R, Ed. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxviii, 1171p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C739i2] (1).
|
|
348.
|
Wireless networks and security
: issues, challenges and research trends
by | Khan, Shafiullah,Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: vi, 512p.Publisher: Berlin Springer 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.382 W743] (1).
|
|
349.
|
Securing emerging wireless systems
: lower-layer approaches
by | Chen, Yingying. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvii, 361p.Publisher: New York Springer 2009Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.384 Se26] (1).
|
|
350.
|
Security for telecommunications networks
by Traynor, Patrick | Mcdaniel, Patrick. Material type: Book; Format:
print
; Literary form:
not fiction
Description: x, 181p.Publisher: New York Springer 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38215 T699s] (1).
|
|
351.
|
Nuclear safety in light water reactors
: severe accident phenomenology
by | Sehgal, Bal Raj, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 714p.Publisher: New York Academic Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.4835 N883] (1).
|
|
352.
|
Nuclear safeguards security and nonproliferation
: achieving security with technology and policy
by | Doyle, James E., Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxi, 592p.Publisher: Amsterdam Elsevier 2010Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 327.1747 N883] (1).
|
|
353.
|
Nuclear criticality saftey
: theory and practice
by Knief, Ronald Allen. Material type: Book; Format:
print
; Literary form:
not fiction
Description: x, 235p.Publisher: Illions American Nuclear Society 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.4835 K741n] (1).
|
|
354.
|
Security and privacy in smart grids
by | Xiao, Yang, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 337p.Publisher: Boca Raton Crc 2014Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.319028558 Se26] (1).
|
|
355.
|
Wireless mobile internet security
by Rhee, Man Young. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xx, 497p.Publisher: Chichester John Wiley & Sons 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 004.678 R341w2] (1).
|
|
356.
|
Security for wireless ad hoc networks
by Anjum, Farooq | Mouchtaris, Petros. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xv, 247p.Publisher: New Jersey John Wiley & Sons 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 An59s] (1).
|
|
357.
|
Network aware security for group communications
by Sun, Yan | Trappe, Wade. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvii, 304p.Publisher: New York Springer 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 Su71n] (1).
|
|
358.
|
Earthquake hazard, risk, and disasters
by Shroder, John F. [ed.]. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv, 582p.Publisher: Amsterdam Elsevier 2014Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 363.3495 Ea76] (1).
|
|
359.
|
Intrusion detection in wireless Ad-Hoc networks
by | Chaki, Nabendu, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 244p.Publisher: Boca Raton Crc Press 2014Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 In7] (1).
|
|
360.
|
IT security risk management
: perceived IT security risks in the context of cloud computing
by Ackermann, Tobias. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv, 190p.Publisher: Germany Springer 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 Ac57i] (1).
|