Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 127 results.

Sort
Results
21.
Ethical hacking guide to corporate security Ankit Fadia by
Material type: Text Text
Language: English
Publication details: New Delhi Macmillan 2004
Availability: Items available for loan: Central Library (1)Call number: 005.8 F12t.

22.
Cryptography and network security principles and practices William Stallings by
Edition: 3rd ed.
Material type: Text Text
Language: English
Publication details: Delhi Pearson Education (Singapore) 2003
Availability: Items available for loan: Central Library (1)Call number: 005.82 St18c3.

23.
Cryptography and network security Atul Kahate by
Material type: Text Text
Language: English
Publication details: New Delhi Tata McGraw-Hill Publishing Company Limited 2003
Availability: Items available for loan: Central Library (1)Call number: 005.82 K12c.

24.
Buffer overflow attacks detect, exploit, prevent James C. Foster...[et al.] by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 F811b.

25.
Aggressive network self-defense Neil Archibald by
Material type: Text Text
Language: English
Publication details: Navi Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 004.65 Ag38.

26.
Snort cookbook solutions and examples for snort administrators Angela Orebaugh by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 Or1s.

27.
Network security bible Eric Cole by
Material type: Text Text
Language: English
Publication details: New Delhi Wiley 2005
Availability: Items available for loan: Central Library (2)Call number: 005.8 C674n, ...

28.
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals James C. Foster by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 F814s.

29.
PC pest control protect your computers from malicious internet invaders Preston Gralla by Series:
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.84 G761p.

30.
Beginning cryptography with java David Hook by
Material type: Text Text
Language: English
Publication details: New Delhi Dreamtech 2005
Availability: Items available for loan: Central Library (1)Call number: 005.82 H764b.

31.
Mastering freeBSD and open BSD security Yanek Korff by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.432 K843m.

32.
Security in computing Charles P. Pfleeger by
Edition: 3rd ed.
Material type: Text Text
Language: English
Publication details: New Delhi Prentice-Hall of India Private Limited 2003
Availability: Items available for loan: Central Library (3)Call number: 005.8 P483s3, ... Not available: Central Library: Checked out (1).

33.
Web services security Mark O'Neill...[et al.] by
Material type: Text Text
Language: English
Publication details: New Delhi Tata McGraw-Hill Publishing Company Limited 2003
Availability: Items available for loan: Central Library (1)Call number: 005.8 On26w.

34.
MPLS VPN security Michael H. Behringer by
Material type: Text Text
Language: English
Publication details: Delhi Pearson Education 2006
Availability: Items available for loan: Central Library (1)Call number: 005.8 B396m.

35.
Introduction to computer security Matt Bishop by
Material type: Text Text
Language: English
Publication details: Delhi Pearson Education 2006
Availability: Items available for loan: Central Library (1)Call number: 005.8 B541i.

36.
Cryptography and network security principles and practices William Stallings by
Edition: 4th ed.
Material type: Text Text
Language: English
Publication details: New Delhi Prentice-Hall of India Private Limited 2006
Availability: Items available for loan: Central Library (1)Call number: 005.82 St18c4.

37.
Silence on the wire a field guide to passive reconnaissance and indirect attacks Michal Zalewski by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 Z14s.

38.
Professional windows desktop and server hardening Roger A. Grimes by
Material type: Text Text
Language: English
Publication details: New Delhi Wiley 2006
Availability: Items available for loan: Central Library (1)Call number: 005.8 G883p.

39.
Implementing database security and auditing a guide for DBAs, information security administrators and auditors Ron Ben Natan by
Material type: Text Text
Language: English
Publication details: New Delhi Elsevier 2005
Availability: Items available for loan: Central Library (2)Call number: 005.74 N191i, ...

40.
Network security a hacker's perspective Ankit Fadia by
Edition: 2nd ed.
Material type: Text Text
Language: English
Publication details: New Delhi MacMillan 2006
Availability: Items available for loan: Central Library (1)Call number: 005.8 F12n.

Designed & Maintained by: Central Library, LNMIIT, Jaipur