Your search returned 123 results.

Not what you expected? Check for suggestions
1.
Course in number theory and cryptography. Ed 2.

by KOBLITZ (Neal).

Edition: Material type: Text Text Publisher: New York. Springer-Verlag New York, Inc., 1994Availability: Items available for loan: St Aloysius College (Autonomous)Call number: 512.7 KOBC (1).

2.
Cryptography and network security: principles and practice Ed 6

by STALLINGS (William).

Edition: Material type: Text Text Language: English Publisher: Noida Pearson 2016Availability: Items available for loan: St Aloysius College (Autonomous)Call number: 005.82 STAC (1).

3.
Cryptography and network security

by AMJAD (M).

Material type: Text Text Language: English Publisher: New Delhi I.K. International Pub. House Pvt. Ltd. 2015Availability: Items available for loan: St Aloysius College (Autonomous)Call number: 005.82 AMJC (1).

4.
Computer virus protection handbook.

by Haynes, Colin.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi BPB Publications 1990Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 HAYC (1).

5.
Computer security: art andscience. Art andscience.

by Bishop, Matt.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: Boston Addison Wesley 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 BISM (1).

6.
Computer viruses: prevention detection and removal. Prevention detection and removal.

by Kapur, Rajneesh.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi BPB Publications 1993Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 KAPR (1).

7.
Computer viruses: prevention detection and removal. Prevention detection and removal.

by Kapur, Rajneesh.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi BPB Publications 1993Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 KAPR (1).

8.
Computer virus protection handbook.

by Haynes, Colin.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi BPB Publications 1990Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 HAYC (1).

9.
Professional linux development / By Mike Banahan...[et. al.].

by Banahan, Mike.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: Mumbai : Shroff Publishers and Distributors Pvt Ltd , 2000Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.44 BANM (2).

10.
Network security essentials : Applications and standards / By William Stallings

by Stallings, William.

Edition: 1st ed. Low Price EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi : Pearson Education , 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 STAW (3).

11.
Unofficial guide to ethical hacking.

by Fadia, Ankit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Macmillan India Ltd 2001Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 FADA (1).

12.
Unofficial guide to ethical hacking.

by Fadia, Ankit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Macmillan India Ltd 2001Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 FADA (1).

13.
Cryptography in c and c++.

by Welschenbach, Michael.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Apress 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.82 WELM (1).

14.
Cryptography in c and c++.

by Welschenbach, Michael.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New York Apress 2001Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.82 WELM (1).

15.
Network security: a hackers perspective. Hackers perspective.

by Fadia, Ankit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Macmillan India Ltd 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 FADA (1).

16.
Inside network perimeter security: the definitive guide to firewalls vpns routers and intrusion detection systems. Definitive guide to firewalls vpns routers and intrusion detection systems.

by Northcutt, Stephen.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Pearson Education 2002Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 NORS (1).

17.
Electronic commerce: security risk management and control / By Marilyn Greenstein and Todd M Feinman..

by Greenstein , Marilyn | Feinman, Todd M.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi : Tata McGraw Hill Publishing Company Ltd , 2000Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 004.694 GREM (4). Items available for reference: St Aloysius Institute of Management & Information Technology Reference BookCall number: 004.694 GREM (1).

18.
Network security: a hackers perspective. Hackers perspective.

by Fadia, Ankit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi Macmillan India Ltd 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 FADA (1).

19.
Basics of network security firewalls and vpns.

by Niit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi PHI Learning Pvt Ltd 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 NIIT (1).

20.
Ethics and security management on the web.

by Niit.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New Delhi PHI Learning Pvt Ltd 2003Availability: Items available for loan: St Aloysius Institute of Management & Information TechnologyCall number: 005.8 NIIT (1).


Powered by Koha