Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Your search returned 114 results. Subscribe to this search

|
1. NETWORK AND INTERNETWORK SECURITY PRINCIPLES AND PRACTICE

by Stallings,William.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii,462.Publisher: Prentice Hall, Englewood Cliffs 1995Availability: No items available Withdrawn (1).

2. SAFETY OF COMPUTER CONTROL SYSTEMS 1991 (SAFECOMP' 91)

by Lindeberg, J. F.

Material type: book Book Description: xi,186.Publisher: Oxford Pergamon Press c1991Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 670.427 Sa17] (1).

3. NT NETWORK SECURITY

by Strebe,Matthew, Perkins,Charles | Moncur,Michael G.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxvi,929.Publisher: Bpb Publications,Delhi 1998Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 ST83M] (1).

4. Twofish encryption algorithm : A 128-bit block cipher

by Schneier Bruce | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: not fiction Description: xi, 186p.Publisher: New York John Wiley & Sons 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 T932s] (1).

5. INTRUSION DETECTION

by Escamilla,Terry.

Material type: book Book; Format: print ; Literary form: not fiction Description: xx,348.Publisher: John Wiley, New York 1998Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 ES15I] (1).

6. ELLIPTIC CURVES AND THEIR APPLICATIONS TO CRYPTOGRAPHY

by Enge,Andreas.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi,164.Publisher: Kluwer Academic Publishers, Boston 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 EN32E] (1).

7. BUILDING LINUX AND OPENBSD FIREWALLS

by Sonnenreich,Wes | Yates,Tom.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxi,362.Publisher: John Wiley, New York 2000Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SO53B] (1).

8. APPLIED CRYPTOGRAPHY

by Schneier,Bruce.

Material type: book Book Description: xviii,618.Publisher: John Wiley, New York c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 SCH58A] (1).

9. NETWORK SECURITY

by Kaufman,Charlie,Perlman,Radia | Speciner,Mike.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).

10. CODING THEORY AND AND CRYPTOGRAPHY

by Hankerson,D. R.

Edition: 2nd Rev.Material type: book Book; Format: print ; Literary form: not fiction Description: x,350.Publisher: Marcel Dekker, New York 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 H195C2] (1).

11. PKI

by Austin,Tom.

Material type: book Book; Format: print ; Literary form: not fiction Description: xviii,270.Publisher: John Wiley,New York 2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 AU77P] (1).

12. COMPUTER SECURITY

by Gollmann,Dieter.

Material type: book Book; Format: print ; Literary form: not fiction Description: xv,320.Publisher: John Wiley, Chichester 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 G582C] (1).

13. DECRYPTED SECRETS

by Bauer,Kriedrich L.

Edition: 2nd Rev.Material type: book Book; Format: print ; Literary form: not fiction Description: xii,470.Publisher: Springer-Verlag, Berlin 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 652.8 B329D2] (1).

14. INFORMATION SECURITY ARCHITECTURE

by Killmeyer,Jan.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxvii,393.Publisher: Auerbach, Boca Raton 2006Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K557I2] (1).

15. Secrets and lies : digital security in a networked world

by Scheier, Bruce.

Material type: book Book; Format: print ; Literary form: not fiction Description: xv,412p.Publisher: New York John Wiley 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 SCH57S] (1).

16. Fundamentals of network security

by Canavan, John E.

Material type: book Book Description: xx, 319p.Publisher: Boston Artech House c2001Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 C16f] (1).

17. CRYPTOGRAPHY AND SECURE COMMUNICATIONS

by Rhee,Man Young.

Material type: book Book Description: xv,504.Publisher: Mcgraw-Hill, Singapore c1994Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 R342C] (1).

19. PROGRAMMING WINDOWS SECURITY.

by Brown,Keith.

Material type: book Book; Format: print ; Literary form: not fiction Description: xxi,580.Publisher: Addison-Wesley, Boston 2000Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 B812P] (1).

20. Staying legal : A guide to issues and practice for users and publishers of electronic resources

by | Armstrong, C.J., Ed.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi, 266p.Publisher: London Library Association Publishing 1999Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 St29] (1).

Powered by Koha