Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Your search returned 128 results. Subscribe to this search

|
81. Netcat power tools

by | Kanclirz, Jan, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiv, 260p.Publisher: U.S.A. Syngress Publishing 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N38] (1).

82. Host identity protocol (HIP) : towards the secure mobile internet

by Gurtov, Andrei.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxvi, 295p.Publisher: Chichester John Wiley 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 G969h] (1).

83. Network security : know it all

by Joshi, James... [Et.Al].

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii, 350p.Publisher: Amsterdam Elsevier 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N389] (1).

84. The library security and safety guide to prevention, planning, and response

by Kahn, Miriam B.

Material type: book Book; Format: print ; Literary form: not fiction Description: ix, 129p.Publisher: Chicago American Library Association 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 025.82 K122l] (1).

85. Wireless network security

by | Xiao, Yang, Ed | Du, Ding-Zhu, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: viii, 522p.Publisher: New York Springer Science+Business Media 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.3821 W743] (1).

86. From problem toward solution : wireless sensor networks security

by | Jiang, Zhen, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xii, 382p.Publisher: New York Nova Science Publishers 2009Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 681.25 F925] (1).

87. Wireless and mobile network security : security basics, security in on-the-shelf and emerging technologies

by | Chaouchi, Hakima, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix, 667p.Publisher: London Jste Ltd. 2009Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 W743] (1).

88. Bulletproof wireless security : GSM, UMTS, 802.11 and Ad hoc security

by Chandra, Praphul.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxxiii, 237p.Publisher: Amsterdam Elsevier 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C361b] (1).

89. A multidisciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxv, 322p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 M699m] (1).

90. Physical-layer security

by Bloch, Matthieu | Barros, Jao.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi, 329p.Publisher: Cambridge Cambridge University Press 2011Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 B62p] (1).

91. Smart grid : applications, communications, and security

by | Berger, Lars Torsten, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xviii, 464p.Publisher: New Jersey John Wiley & Sons 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.319 Sm27] (1).

92. Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS

by Macaulay, Tyson | Singer, Bryan.

Material type: book Book; Format: print ; Literary form: not fiction Description: x, 193p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 M119c] (1).

93. Smart grid security : an end-to-end view of security in the new electrical grid

by Sorebo, Gilbert N | Echols, Michael C.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxvi, 302p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.319 So68s] (1).

94. Communication system security

by Chen, Lidong | Gong, Guang.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix, 730p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38928 C42c] (1).

95. Pragmatic security metrics : applying metametrics to information security

by Brotby, W. Krag | Hinson, Gary.

Material type: book Book; Format: print ; Literary form: not fiction Description: xviii, 494p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.472 B794p] (1).

96. Secure broadcast communication in wired and wireless networks

by Perrig, Adrian | Tygar, J. D.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix, 214p.Publisher: Boston Kluwer Academic Publishers 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38212 P428s] (1).

97. Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure

by Knapp, Eric D | Samani, Raj, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxii, 202p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.31028558 K727a] (1).

98. Handbook of SCADA / control systems security

by | Radvanovsky, Robert, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxvii, 355p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H191] (1).

99. Photonic sensing : principles and applications for saftey and security monitoring

by | Xiao,Gaozhi, Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiv, 313p.Publisher: New Jersey John Wiley & Sons 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 681.25 P566] (1).

100. Computer and information security handbook

by | Vacca, John R, Ed.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxviii, 1171p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C739i2] (1).

Powered by Koha