Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Your search returned 21 results. Subscribe to this search

|
1. COMPUTER SECURITY AND PROTECTION STRUCTURES

by Walker, Bruce J | Blake, Ian F.

Material type: book Book; Format: print ; Literary form: not fiction Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).

2. Cryptography and data security

by Denning, Dorothy Elizabeth Robling.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).

3. Cryptography and data security

by Denning, Dorothy Elizabeth Robling.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).

4. Cryptography and data security

by Denning, Dorothy Elizabeth Robling.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii, 400p.Publisher: Reading, Massachusetts Addison-Wesley 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.640289 D422c] (1).

5. FOUNDATION OF SECURE COMPUTATION

by Demillo, Richard A.

Material type: book Book; Format: print ; Literary form: not fiction Description: x,404.Publisher: New York Academic Press 1978Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.64 F825] (1).

6. COMPUTERS AND PRIVACY IN THE NEXT DECADE

by Hoffman, Lance J.

Material type: book Book; Format: print ; Literary form: not fiction Description: xiii,215.Publisher: New York Academic Press 1980Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 323.4480973 C739] (1).

7. COMPUTER SECURITY AND PROTECTION STRUCTURES

by Walker, Bruce J | Blake, Ian F.

Material type: book Book; Format: print ; Literary form: not fiction Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).

8. COMPUTER SECURITY AND PROTECTION STRUCTURES

by Walker, Bruce J | Blake, Ian F.

Material type: book Book; Format: print ; Literary form: not fiction Description: 142.Publisher: Stroudsburg, Dowden Hutchinson & Ross 1977Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 W151c] (1).

9. PRINCIPLES OF DATA SECURITY

by Leiss, Ernst L.

Material type: book Book; Format: print ; Literary form: not fiction Description: x,227.Publisher: New York Plenum 1982Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.644 L535p] (1).

10. SECURITY FOR COMPUTER NETWORKS

by Davies, D. W | Price, W. L.

Material type: book Book; Format: print ; Literary form: not fiction Description: xix,386.Publisher: Chichester Wiley 1984Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.478 D29s] (1).

11. COMPUTER SECURITY

by Hsiao, David K | Madnick, Stuart E.

Material type: book Book; Format: print ; Literary form: not fiction Description: xvi,299.Publisher: New York Academic 1979Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 658.47 H859c] (1).

12. SAFE AND SECURE COMPUTING SYSTEMS

by Anderson, T. [ed.].

Material type: book Book; Format: print ; Literary form: not fiction Description: vi, 250p.Publisher: Oxford Blackwell 1989Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 001.64 Sa17] (1).

13. ELLIPTIC CURVE PUBLIC KEY CRYPTOSYSTEMS

by Menezes,Alfred.

Material type: book Book Description: xii,128.Publisher: Kluwer Academic Publishers, Boston c1993Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 M524E] (1).

14. COMPUTERS, ETHICS, AND SOCIETY

by Ermann, David M | Gutierrez, Claudio.

Material type: book Book; Format: print ; Literary form: not fiction Description: ix,376.Publisher: New York Oxford Univ. Press 1990Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 303.4834 Er55c] (1).

15. Handbook of applied cryptography

by Menezes,Alfred J, Van Oorschot,Paul C | Vanstone,Scott A.

Material type: book Book Description: xxviii,780.Publisher: Crc Press, Boston 1997Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 M524H] (1).

16. NETWORK SECURITY

by Kaufman,Charlie,Perlman,Radia | Speciner,Mike.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: not fiction Description: xxvi,713.Publisher: Pearson Education ( Singapore ) Pte. Ltd., Delhi 2003Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.8 K162N2] (1).

17. INFORMATION TRANSFER POLICY

by Eisenschitz,Tamara S.

Material type: book Book Description: ix,175.Publisher: Library Association, London c1993Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 025.52 EI84I] (1).

18. FUNDAMENTALS OF CRYPTOLOGY

by Tilborg,Henk C. A Van.

Material type: book Book Description: xiv,491.Publisher: Kluwer Academic Publishers, Boston c2000Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 005.8 T451F] (1).

19. DATABASE SECURITY III : STATUS AND PROSPECTS; RESULTS...

by Spooner, Davidl | Landwehr, Carl | .

Description: .Publisher: Availability: Items available for reference: PK Kelkar Library, IIT Kanpur [Call number: 001.6425 IF5D] (1).

20. PUBLIC-KEY CRYPTOGRAPHY

by Garrett,Paul | Lieman,Daniel | .

Description: vii,183.Publisher: American Mathematical Society, Providence 2005Availability: Items available for loan: PK Kelkar Library, IIT Kanpur [Call number: 005.82 AM35P] (1).

Powered by Koha