|
41.
|
NETWORK SECURITY
by Kaufman,Charlie,Perlman,Radia | Speciner,Mike. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).
|
|
42.
|
PRACTICAL INTRUSION DETECTION HANDBOOK
by Proctor,Paul E. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv,359.Publisher: Prentice-Hall International, Upper Saddle River 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 P942P] (1).
|
|
43.
|
PKI
by Austin,Tom. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xviii,270.Publisher: John Wiley,New York 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 AU77P] (1).
|
|
44.
|
Secrets and lies
: digital security in a networked world
by Scheier, Bruce. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xv,412p.Publisher: New York John Wiley 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SCH57S] (1).
|
|
45.
|
Fundamentals of network security
by Canavan, John E. Material type: Book Description: xx, 319p.Publisher: Boston Artech House c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C16f] (1).
|
|
46.
|
CRYPTOGRAPHY AND SECURE COMMUNICATIONS
by Rhee,Man Young. Material type: Book Description: xv,504.Publisher: Mcgraw-Hill, Singapore c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 R342C] (1).
|
|
47.
|
WEB-BASED MANAGEMENT
by Harnedy,Sean. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv,389.Publisher: Prentice Hall, New Jersey 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.4038 H229W] (1).
|
|
48.
|
HANDBOOK OF MODERN HOSPITAL SAFETY
by Charney,William. Material type: Book Description: 1049.Publisher: Lewis Publishers, Boca Raton c1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 362.110984 C423H] (1).
|
|
49.
|
SECURITY FUNDAMENTALS FOR E-COMMERCE
by Hassler,Vesna. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxii,409.Publisher: Artech House, Boston 2001Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H279S] (1).
|
|
50.
|
COMPUTER SECURITY HANDBOOK
by Seymour Bosworth,M. E. Kabay | Kabay,M. E. Edition: 4thMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv.Publisher: John Wiley,New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C738B4] (1).
|
|
51.
|
METHODS OF ACHIEVING IMPROVED SEISMIC PERFORMANCE OF COMMUNICATIONS SYSTEMS
by Alex Tang,Anshel J Schiff | Schiff,Anshel J. Material type: Book Description: xi,180.Publisher: American Society Of Civil Engineers,New York c1997Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.382 M566] (1).
|
|
52.
|
Staying legal
: A guide to issues and practice for users and publishers of electronic resources
by | Armstrong, C.J., Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 266p.Publisher: London Library Association Publishing 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 St29] (1).
|
|
53.
|
CONTEMPORARY SECURITY MANAGEMENT
by Fay,John J. Material type: Book Description: x,393.Publisher: Butterworth-Heinemann, Boston c2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 F29C] (1).
|
|
54.
|
COMPUTER INTRUSION DETECTION AND NETWORK MONITORING
by Marchette,David J. Material type: Book Description: xvii,332.Publisher: Springer-Verlag,New York c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 M332C] (1).
|
|
55.
|
Kerberos
: a Network authenticate system
by Tung,Brain. Material type: Book Description: xv,164p.Publisher: Singapore Addison Wesley Longman Singapore Pte. Ltd. 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 T834K] (1).
|
|
56.
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM SECURITY
by Niemi,Valtteri | Nyberg,Kaisa. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii,273.Publisher: John Wiley & Sons Inc., New Jersey 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N55U] (1).
|
|
57.
|
RISK ANALYSIS AND THE SECURITY SURVEY
by Broder,James F. Edition: 3rdMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xviii,371.Publisher: Butterworth-Heinemann, Burlington 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 363.11 B784R3] (1).
|
|
58.
|
SECURING E-BUSINESS SYSTEMS
by Braithwaite,Timothy. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi,272.Publisher: John Wiley, New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.84 B731S] (1).
|
|
59.
|
RISK MANAGEMENT FOR SECURITY PROFESSIONALS
by Roper,Carl A. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii,354.Publisher: Butterworth-Heinemann, Boston 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 R682R] (1).
|
|
60.
|
AAA AND NETWORK SECURITY FOR MOBILE ACCESS
by Nakhjiri,Madjid | Nakhjiri,Mahsa. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xx,295.Publisher: John Wiley, Chichester 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N146A] (1).
|