Your search returned 14 results.

Sort
Results
1.
Security architecture for open distributed systems /Sead Muftic (...) by
  • Muftic, Sead
  • Patel, Ahmed
  • Sandres, Peter
Series: Wiley Series in Communication and Distributed Systems
Material type: Text Book
Publication details: Chichester JW 1993
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N93.

2.
Database security /Silvana Castano, Mariagrazia Fugini, (...) by
  • Castano, Silvana
  • Fugini, Mariagrazia
  • Martella, Giancarlo
Material type: Text Book
Publication details: Wokingham A-W 1994
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N941.

3.
Information security: an integrated collection of essays by
  • ed. by Marshall D Abrams, Sushil Jajodia and Harold J Podell
  • Abrams, Marshall D., ed
  • Jajodia, Sushil
  • Podell, Harold J
Material type: Text Book
Publication details: Los Alamitos IEEE Comp. Soc. Pr. 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N95.

4.
Network and internetwork security principles and practice by
  • by William Stallings
  • Stallings, William
Material type: Text Book
Publication details: Englewood Cliffs Prentice-Hall 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N953.

5.
Building in big brother: the cryptographic policy debate /ed. by Lance J Hoffman by
  • Hoffman, Lance J
Material type: Text Book
Publication details: New York S-V 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 363.252 N95.

6.
Information Security : An Integrated Collection of Essays ed. by Marshall D Abrams, Sushil Jajodia and Harold J Podell by
  • Abrams, Marshall D., ed
  • Jajodia, Sushil., ed
  • Podell, Harold J., ed
Material type: Text Book
Publication details: Washington IEEE 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N95;1.

7.
Security solutions in vector-criterion games - concepts, theory, and applications by N. Sashishekhar by
  • Shashishekhar, N
Series: IISc, Dept. of Computer Science and Automation, PhD thesis
Material type: Text Book
Publication details: Bangalore IISc 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 519.302858 N95 "THESIS".

8.
Computer security by Peter Hamilton by
  • Hamilton, Peter
Material type: Text Book
Publication details: London Associated Business Programs 1972
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 658.478 N72.

9.
Technology assessment Methods for measuring the level of computer security by William Neugent,[et al] by
  • Neugent, William.[et al]
Series: Computer science and technology
Material type: Text Book
Publication details: Washington U.S.Department of Commerce 1985
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 001.64044 N855.

10.
Aerospace computer security applications by
  • IEEE Aerospace Computer Security Applications conference ( 4th 1988
Material type: Text Book
Publication details: New York IEEE 1988
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.1 N889.

11.
ASP/MTS/ADSI web security by Harrison by
  • Harrison
Material type: Text Book
Publication details: New Jersey Prentice Hall/PTR 2000
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.71 P1 (BTIS).

12.
Network security essentials Application and standards by William Stallings by
  • Stallings, William
Material type: Text Book
Publication details: Delhi PEA 2000
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 P1 'R'.

13.
Encyclopedia of cryptography and Security ed by Henk C A van Tilborg by
  • Van Tilborg, Henk C A.,ed
Material type: Text Book
Publication details: Netherlands Springer 2005
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 P05 "R".

14.
Computer security handbook. 2.Vols. ed by Seymour Bosworth, M E Kabay and Eric Whyne by
  • Bosworth, Seymour., ed
  • Kabay, M E., ed
  • Whyne, Eric., ed
Edition: 5th ed.
Material type: Text Book
Publication details: New Jersey Wiley 2009
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (2)Call number: 005.8 P09.1-.2 "R", ...

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha