|
1.
|
COMPUTER SECURITY AND PROTECTION STRUCTURES
by Walker, Bruce J | Blake, Ian F. Material type: Book; Format:
print
; Literary form:
not fiction
Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).
|
|
2.
|
Cryptography and data security
by Denning, Dorothy Elizabeth Robling. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).
|
|
3.
|
Cryptography and data security
by Denning, Dorothy Elizabeth Robling. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).
|
|
4.
|
Cryptography and data security
by Denning, Dorothy Elizabeth Robling. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).
|
|
5.
|
Database security and integrity
by Fernandez, Eduardo B | Wood, Christopher. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiv, 320p.Publisher: Reading, Massachusetts Addison-Wesley Publishing 1981Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.64 F391d] (1).
|
|
6.
|
FOUNDATION OF SECURE COMPUTATION
by Demillo, Richard A. Material type: Book; Format:
print
; Literary form:
not fiction
Description: x,404.Publisher: New York Academic Press 1978Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.64 F825] (1).
|
|
7.
|
COMPUTERS AND PRIVACY IN THE NEXT DECADE
by Hoffman, Lance J. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xiii,215.Publisher: New York Academic Press 1980Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 323.4480973 C739] (1).
|
|
8.
|
COMPUTER FRAUD AND COUNTER MEASURES
by Krauss, Leonard I | Macgahan, Aileen. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xv,509.Publisher: Englewood Cliffs, N. J. Prentice-Hall 1979Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 364.163 K868c] (1).
|
|
9.
|
COMPUTER SECURITY AND PROTECTION STRUCTURES
by Walker, Bruce J | Blake, Ian F. Material type: Book; Format:
print
; Literary form:
not fiction
Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).
|
|
10.
|
COMPUTER SECURITY AND PROTECTION STRUCTURES
by Walker, Bruce J | Blake, Ian F. Material type: Book; Format:
print
; Literary form:
not fiction
Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).
|
|
11.
|
PRINCIPLES OF DATA SECURITY
by Leiss, Ernst L. Material type: Book; Format:
print
; Literary form:
not fiction
Description: x,227.Publisher: New York Plenum 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 L535p] (1).
|
|
12.
|
SECURITY FOR COMPUTER NETWORKS
by Davies, D. W | Price, W. L. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xix,386.Publisher: Chichester Wiley 1984Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 D29s] (1).
|
|
13.
|
COMPUTER SECURITY
by Hsiao, David K | Madnick, Stuart E. Material type: Book; Format:
print
; Literary form:
not fiction
Description: xvi,299.Publisher: New York Academic 1979Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 H859c] (1).
|
|
14.
|
SAFE AND SECURE COMPUTING SYSTEMS
by Anderson, T. [ed.]. Material type: Book; Format:
print
; Literary form:
not fiction
Description: vi, 250p.Publisher: Oxford Blackwell 1989Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.64 Sa17] (1).
|
|
15.
|
ELLIPTIC CURVE PUBLIC KEY CRYPTOSYSTEMS
by Menezes,Alfred. Material type: Book Description: xii,128.Publisher: Kluwer Academic Publishers, Boston c1993Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 M524E] (1).
|
|
16.
|
COMPUTERS, ETHICS, AND SOCIETY
by Ermann, David M | Gutierrez, Claudio. Material type: Book; Format:
print
; Literary form:
not fiction
Description: ix,376.Publisher: New York Oxford Univ. Press 1990Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 303.4834 Er55c] (1).
|
|
17.
|
Handbook of applied cryptography
by Menezes,Alfred J, Van Oorschot,Paul C | Vanstone,Scott A. Material type: Book Description: xxviii,780.Publisher: Crc Press, Boston 1997Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 M524H] (1).
|
|
18.
|
PUBLIC-KEY CRYPTOGRAPHY
by Salomaa,Arto. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: x,271.Publisher: Springer-Verlag,Berlin 1996Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 SA36P2] (1).
|
|
19.
|
NETWORK SECURITY
by Kaufman,Charlie,Perlman,Radia | Speciner,Mike. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
not fiction
Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).
|
|
20.
|
INFORMATION TRANSFER POLICY
by Eisenschitz,Tamara S. Material type: Book Description: ix,175.Publisher: Library Association, London c1993Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 025.52 EI84I] (1).
|