Your search returned 9 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.

by Easttom, Chuck.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : McGraw Hill Education, c.2016Availability: Items available for loan: [Call number: 005.82 EAS] (3).

Log in to add tags. Add to cart
Cryptography and information security / V. K. Pachghare.

by Pachghare, V. K.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New Delhi : PHI Learning Private Limited, c.2015Availability: Items available for loan: [Call number: 005.82 PAC] (1).

Network management : principles and practice / Mani Subramanian ; with contributions from Timothy A. Gonsalves, N. Usha Rani.

by Subramanian, Mani | Gonsalves, Timothy A [contributor.] | Usha Rani, N [contributor.] | Safari Books Online (Firm).

Edition: 11th impression.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New Delhi : Dorling Kindersley, 2014Availability: Items available for loan: [Call number: 004.6 SUB] (2). Items available for reference: [Call number: 004.6 SUB] (1).

Fundamentals of communications and networking / Michael G. Solomon and David Kim.

by Solomon, Michael, 1966- | Kim, David.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Burlington : Jones & Bartlett Learning, c.2013Availability: Items available for loan: [Call number: 004.6 SOL] (1).

Computer networks : a systems approach / Larry L. Peterson and Bruce S.Davie.

by Peterson, Larry L | Davie, Bruce S.

Edition: 5th ed., International student ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Burlington : Morgan Kaufmann / Elsevier, c.2012Availability: Items available for loan: [Call number: 004.65 PET] (1).

Security for cloud storage systems / Kan Yang, Xiaohua Jia.

by Yang, Kan | Jia, Xiaohua.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Springer, c.2014Availability: Items available for loan: [Call number: 005.8 YAN] (1).

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano.

by Oriyano, Sean-Philip.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Burlington : Jones & Bartlett Learning, c.2014Availability: Items available for loan: [Call number: 621.38 ORI] (1).

Computer security : protecting digital resources / Robert C. Newman.

by Newman, Robert C.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Sudbury : Jones and Bartlett Publishers, c.2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).

Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, R. R.

Edition: 3rd ed., International ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River : Pearson Education, c.2013Availability: Items available for loan: [Call number: 005.8 BOY] (1).

Powered by Koha