|
81.
|
SOCIAL SECURITY OF LABOUR IN INDIA AND ECONOMIC REFORMS
by M.,Naidu, K. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxx,136.Publisher: Serials Publications, New Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 331.2596 SO13] (1).
|
|
82.
|
COMPUTER SECURITY HANDBOOK
by Seymour Bosworth,M. E. Kabay | Kabay,M. E. Edition: 4thMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv.Publisher: John Wiley,New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C738B4] (1).
|
|
83.
|
WEAPONS OF PEACE
by Chengappa,Raj. Material type: Book Description: xvi,489.Publisher: Harper-Collins Pub. India, New Delhi c2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 355.02170954 C421W] (1).
|
|
84.
|
METHODS OF ACHIEVING IMPROVED SEISMIC PERFORMANCE OF COMMUNICATIONS SYSTEMS
by Alex Tang,Anshel J Schiff | Schiff,Anshel J. Material type: Book Description: xi,180.Publisher: American Society Of Civil Engineers,New York c1997Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.382 M566] (1).
|
|
85.
|
SOCIAL PROTECTION IN ASIA
by Cook,Sarah,Kabeer,Naila | Suwannarat,Gary. Material type: Book; Format:
print
; Literary form:
not fiction
Description: 288.Publisher: Har-Anand Publications, New Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 362.0424095 C773S] (1).
|
|
86.
|
Staying legal
: A guide to issues and practice for users and publishers of electronic resources
by | Armstrong, C.J., Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 266p.Publisher: London Library Association Publishing 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 St29] (1).
|
|
87.
|
CONTEMPORARY SECURITY MANAGEMENT
by Fay,John J. Material type: Book Description: x,393.Publisher: Butterworth-Heinemann, Boston c2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 F29C] (1).
|
|
88.
|
COMPUTER INTRUSION DETECTION AND NETWORK MONITORING
by Marchette,David J. Material type: Book Description: xvii,332.Publisher: Springer-Verlag,New York c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 M332C] (1).
|
|
89.
|
Kerberos
: a Network authenticate system
by Tung,Brain. Material type: Book Description: xv,164p.Publisher: Singapore Addison Wesley Longman Singapore Pte. Ltd. 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 T834K] (1).
|
|
90.
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM SECURITY
by Niemi,Valtteri | Nyberg,Kaisa. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii,273.Publisher: John Wiley & Sons Inc., New Jersey 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N55U] (1).
|
|
91.
|
RISK ANALYSIS AND THE SECURITY SURVEY
by Broder,James F. Edition: 3rdMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xviii,371.Publisher: Butterworth-Heinemann, Burlington 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 363.11 B784R3] (1).
|
|
92.
|
SECURING E-BUSINESS SYSTEMS
by Braithwaite,Timothy. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi,272.Publisher: John Wiley, New York 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.84 B731S] (1).
|
|
93.
|
RISK MANAGEMENT FOR SECURITY PROFESSIONALS
by Roper,Carl A. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii,354.Publisher: Butterworth-Heinemann, Boston 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 R682R] (1).
|
|
94.
|
AAA AND NETWORK SECURITY FOR MOBILE ACCESS
by Nakhjiri,Madjid | Nakhjiri,Mahsa. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xx,295.Publisher: John Wiley, Chichester 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N146A] (1).
|
|
95.
|
SECURITY IN COMPUTING
by Pfleeger,Charles P | Pfleeger,Shari Lawrence. Edition: 3Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxix,746.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 P483S3] (1).
|
|
96.
|
GUIDELINES FOR ANALYSING AND MANAGING THE SECURITY VULNERABILITIES OF FIXED CHENICAL SITES
by . Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxii,216.Publisher: Center For Chemical Proc Chemical Engineers, Usa 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 660.2804 G941A] (1).
|
|
97.
|
INTERNET SECURITY GUIDEBOOK
by Ellis,Juanita | Speed,Tim. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxiv,320.Publisher: Academic Press, San Diego 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 EL59I] (1).
|
|
98.
|
DATABASE AND APPLICATIONS SECURITY
by Thuraisingham,Bhavani. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxxvi,619.Publisher: Auerbach, Boca Raton 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 T42D] (1).
|
|
99.
|
PUBLIC KEY INFRASTRUCTURE
by Vacca,John R. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xl,404.Publisher: Auerbach, Boca Raton 2004Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 V13P] (1).
|
|
100.
|
BUILDING SECURE SOFTWARE
by Viega,John,Mcgraw,Gary. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxx,493.Publisher: Addison-Wesley,Boston 2002Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 V671B] (1).
|