Your search returned 12 results.

1.
Cryptography and network security: principles and practice

by Stallings, William.

Edition: 2nd Material type: Text Text Publication details: Pearson education asia New Delhi 2002Availability: No items available :

2.
Viruses revealed : understand and counter malicious software

by Harney, David Slade, Robert & Gattiker, U, R.

Material type: Text Text Publication details: Dreamtech press New Delhi 2000Availability: No items available :

3.
Security assessment: case studies for implementing the NSA I

by Rogers, Russ. Miles, Greg. Fuller, Ed. Dykstra, Ted. and Hoa.

Material type: Text Text Publication details: Shroff publishers and dis. Pvt. Mumbai 2004Availability: No items available :

4.
Security assessment: case studies for implementing the NSA I

by Rogers, Russ. Miles, Greg. Fuller, Ed. Dykstra, Ted. and Hoa.

Material type: Text Text Publication details: Shroff publishers and dis. Pvt. Mumbai 2004Availability: No items available :

5.
RFID Security

by Thornton, Frank. Haines, Brad. Das, Anand, M. Bhargava, Hers.

Material type: Text Text Publication details: Shroff publishers and dist.Pvt. Mumbai 2006Availability: No items available :

6.
Information theory, coding and cryptography

by Bose, Ranjan.

Edition: 2nd Material type: Text Text Publication details: Tata mcgraw hill company Ltd New Delhi 2008Availability: No items available :

7.
Cryptography and network security: principles and practice

by Stallings, William.

Edition: 2nd Material type: Text Text Publication details: Pearson education asia New Delhi 2002Availability: Items available for loan: Central Library Call number: 005.82 WIL (1).

8.
Viruses revealed : understand and counter malicious software

by Harney, David Slade, Robert & Gattiker, U, R.

Material type: Text Text Publication details: Dreamtech press New Delhi 2000Availability: Items available for loan: Central Library Call number: 005.8 HAR (1).

9.
RFID Security

by Thornton, Frank. Haines, Brad. Das, Anand, M. Bhargava, Hers.

Material type: Text Text Publication details: Shroff publishers and dist.Pvt. Mumbai 2006Availability: Items available for loan: Central Library Call number: 005.82 THO (1).

10.
Security assessment: case studies for implementing the NSA I

by Rogers, Russ. Miles, Greg. Fuller, Ed. Dykstra, Ted. and Hoa.

Material type: Text Text Publication details: Shroff publishers and dis. Pvt. Mumbai 2004Availability: Items available for loan: Central Library Call number: 005.82 ROG (1).

11.
Security assessment: case studies for implementing the NSA I

by Rogers, Russ. Miles, Greg. Fuller, Ed. Dykstra, Ted. and Hoa.

Material type: Text Text Publication details: Shroff publishers and dis. Pvt. Mumbai 2004Availability: Items available for loan: Central Library Call number: 005.82 ROG (1).

12.
Information theory, coding and cryptography

by Bose, Ranjan.

Edition: 2nd Material type: Text Text Publication details: Tata mcgraw hill company Ltd New Delhi 2008Availability: Items available for loan: Central Library Call number: 005.82 BOS (1).

Powered by Koha