|
81.
|
Netcat power tools
by | Kanclirz, Jan, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiv, 260p.Publisher: U.S.A. Syngress Publishing 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N38] (1).
|
|
82.
|
Host identity protocol (HIP)
: towards the secure mobile internet
by Gurtov, Andrei. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi, 295p.Publisher: Chichester John Wiley 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 G969h] (1).
|
|
83.
|
Network security
: know it all
by Joshi, James... [Et.Al]. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 350p.Publisher: Amsterdam Elsevier 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 N389] (1).
|
|
84.
|
The library security and safety guide to prevention, planning, and response
by Kahn, Miriam B. Material type: Book; Format:
print
; Literary form:
not fiction
Description: ix, 129p.Publisher: Chicago American Library Association 2008Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 025.82 K122l] (1).
|
|
85.
|
Wireless network security
by | Xiao, Yang, Ed | Du, Ding-Zhu, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: viii, 522p.Publisher: New York Springer Science+Business Media 2007Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.3821 W743] (1).
|
|
86.
|
From problem toward solution
: wireless sensor networks security
by | Jiang, Zhen, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xii, 382p.Publisher: New York Nova Science Publishers 2009Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 681.25 F925] (1).
|
|
87.
|
Wireless and mobile network security
: security basics, security in on-the-shelf and emerging technologies
by | Chaouchi, Hakima, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xix, 667p.Publisher: London Jste Ltd. 2009Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 W743] (1).
|
|
88.
|
Bulletproof wireless security
: GSM, UMTS, 802.11 and Ad hoc security
by Chandra, Praphul. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxxiii, 237p.Publisher: Amsterdam Elsevier 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C361b] (1).
|
|
89.
|
A multidisciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxv, 322p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 M699m] (1).
|
|
90.
|
Physical-layer security
by Bloch, Matthieu | Barros, Jao. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi, 329p.Publisher: Cambridge Cambridge University Press 2011Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 B62p] (1).
|
|
91.
|
Smart grid
: applications, communications, and security
by | Berger, Lars Torsten, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xviii, 464p.Publisher: New Jersey John Wiley & Sons 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.319 Sm27] (1).
|
|
92.
|
Cybersecurity for industrial control systems
: SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson | Singer, Bryan. Material type: Book; Format:
print
; Literary form:
not fiction
Description: x, 193p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 M119c] (1).
|
|
93.
|
Smart grid security
: an end-to-end view of security in the new electrical grid
by Sorebo, Gilbert N | Echols, Michael C. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi, 302p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.319 So68s] (1).
|
|
94.
|
Communication system security
by Chen, Lidong | Gong, Guang. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xix, 730p.Publisher: Boca Raton Crc Press 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38928 C42c] (1).
|
|
95.
|
Pragmatic security metrics
: applying metametrics to information security
by Brotby, W. Krag | Hinson, Gary. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xviii, 494p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.472 B794p] (1).
|
|
96.
|
Secure broadcast communication in wired and wireless networks
by Perrig, Adrian | Tygar, J. D. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xix, 214p.Publisher: Boston Kluwer Academic Publishers 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.38212 P428s] (1).
|
|
97.
|
Applied cyber security and the smart grid
: implementing security controls into the modern power infrastructure
by Knapp, Eric D | Samani, Raj, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxii, 202p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 621.31028558 K727a] (1).
|
|
98.
|
Handbook of SCADA / control systems security
by | Radvanovsky, Robert, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xxvii, 355p.Publisher: Boca Raton Crc Press 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 H191] (1).
|
|
99.
|
Photonic sensing
: principles and applications for saftey and security monitoring
by | Xiao,Gaozhi, Ed. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiv, 313p.Publisher: New Jersey John Wiley & Sons 2012Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 681.25 P566] (1).
|
|
100.
|
Computer and information security handbook
by | Vacca, John R, Ed. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxviii, 1171p.Publisher: Amsterdam Elsevier 2013Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C739i2] (1).
|