Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Your search returned 128 results. Subscribe to this search

|
41. NETWORK SECURITY

by Kaufman,Charlie,Perlman,Radia | Speciner,Mike.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).

42. PRACTICAL INTRUSION DETECTION HANDBOOK

by Proctor,Paul E.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxiv,359.Publisher: Prentice-Hall International, Upper Saddle River 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 P942P] (1).

43. PKI

by Austin,Tom.

Material type: book Book; Format: print ; Literary form: not fiction Description: xviii,270.Publisher: John Wiley,New York 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 AU77P] (1).

44. Secrets and lies : digital security in a networked world

by Scheier, Bruce.

Material type: book Book; Format: print ; Literary form: not fiction Description: xv,412p.Publisher: New York John Wiley 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SCH57S] (1).

45. Fundamentals of network security

by Canavan, John E.

Material type: book Book Description: xx, 319p.Publisher: Boston Artech House c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C16f] (1).

46. CRYPTOGRAPHY AND SECURE COMMUNICATIONS

by Rhee,Man Young.

Material type: book Book Description: xv,504.Publisher: Mcgraw-Hill, Singapore c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 R342C] (1).

47. WEB-BASED MANAGEMENT

by Harnedy,Sean.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxiv,389.Publisher: Prentice Hall, New Jersey 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.4038 H229W] (1).

48. HANDBOOK OF MODERN HOSPITAL SAFETY

by Charney,William.

Material type: book Book Description: 1049.Publisher: Lewis Publishers, Boca Raton c1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 362.110984 C423H] (1).

49. SECURITY FUNDAMENTALS FOR E-COMMERCE

by Hassler,Vesna.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxii,409.Publisher: Artech House, Boston 2001Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H279S] (1).

50. COMPUTER SECURITY HANDBOOK

by Seymour Bosworth,M. E. Kabay | Kabay,M. E.

Edition: 4thMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxiv.Publisher: John Wiley,New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C738B4] (1).

51. METHODS OF ACHIEVING IMPROVED SEISMIC PERFORMANCE OF COMMUNICATIONS SYSTEMS

by Alex Tang,Anshel J Schiff | Schiff,Anshel J.

Material type: book Book Description: xi,180.Publisher: American Society Of Civil Engineers,New York c1997Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.382 M566] (1).

52. Staying legal : A guide to issues and practice for users and publishers of electronic resources

by | Armstrong, C.J., Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi, 266p.Publisher: London Library Association Publishing 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 St29] (1).

53. CONTEMPORARY SECURITY MANAGEMENT

by Fay,John J.

Material type: book Book Description: x,393.Publisher: Butterworth-Heinemann, Boston c2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 F29C] (1).

54. COMPUTER INTRUSION DETECTION AND NETWORK MONITORING

by Marchette,David J.

Material type: book Book Description: xvii,332.Publisher: Springer-Verlag,New York c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 M332C] (1).

55. Kerberos : a Network authenticate system

by Tung,Brain.

Material type: book Book Description: xv,164p.Publisher: Singapore Addison Wesley Longman Singapore Pte. Ltd. 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 T834K] (1).

56. UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM SECURITY

by Niemi,Valtteri | Nyberg,Kaisa.

Material type: book Book; Format: print ; Literary form: not fiction Description: xii,273.Publisher: John Wiley & Sons Inc., New Jersey 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N55U] (1).

57. RISK ANALYSIS AND THE SECURITY SURVEY

by Broder,James F.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: not fiction Description: xviii,371.Publisher: Butterworth-Heinemann, Burlington 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 363.11 B784R3] (1).

58. SECURING E-BUSINESS SYSTEMS

by Braithwaite,Timothy.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi,272.Publisher: John Wiley, New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.84 B731S] (1).

59. RISK MANAGEMENT FOR SECURITY PROFESSIONALS

by Roper,Carl A.

Material type: book Book; Format: print ; Literary form: not fiction Description: xii,354.Publisher: Butterworth-Heinemann, Boston 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 R682R] (1).

60. AAA AND NETWORK SECURITY FOR MOBILE ACCESS

by Nakhjiri,Madjid | Nakhjiri,Mahsa.

Material type: book Book; Format: print ; Literary form: not fiction Description: xx,295.Publisher: John Wiley, Chichester 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N146A] (1).

Powered by Koha