Your search returned 209 results.

Sort
Results
121.
Network Interdiction and Stochastic Integer Programming by
  • Woodruff, David L
Material type: Text Book
Publication details: Kluwer Academic Publishers 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

122.
Programmer's Ultimate Security DeskRef by
  • Foster, James
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.1 .

123.
Security Planning and Disaster Recovery by
  • Maiwald, Eric, Sieglein, William
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

124.
Sockets, Shellcode, Porting, and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by
  • Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

125.
SSCP Study Guide & DVD Training System by
  • Jacobs, Josh Dalton, Michael, Clemmer, Lee
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

126.
Technology and Privacy The New Landscape by
  • Rotenberg, Marc, Agre, Philip E
Material type: Text Book
Publication details: MIT Press 1997
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.44/83 .

127.
Trusted Information The New Decade Challenge by
  • Dupuy, Michel, Paradinas, Pierre
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

128.
Ethereal Packet Sniffing by
  • Orebaugh, Angela Warnicke, Ed, Morris, Greg
Material type: Text Book
Publication details: Syngress Publishing
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

129.
Best Damn Firewall Book Period by
  • Shinder, Thomas W. Shimonski, Robert J, Amon, Cherie
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

130.
Check PointT Next Generation with Application Intelligence Security Administration by
  • Contributors Kligerman, Daniel Tobkin, Chris
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

131.
Code Hacking A Developer's Guide to Network Security by
  • Conway, Richard, Cordingley, Julian
Material type: Text Book
Publication details: Charles River Media 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

132.
Configuring NetScreen Firewalls by
  • Cameron, Rob
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

133.
Google Hacking for Penetration Testers by
  • Long, Johnny
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.713 .

134.
Hack Proofing Linux A Guide to Open Source Security by
  • Stanger, James Danielyan, Edgar, Lane, Patrick
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.446 .

135.
Hack Proofing Your Web Application Only Way to Stop a Hacker is to Think by
  • Traxler, Julie, Forristal, Jeff
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

136.
Hacker's Challenge by
  • Schiffman, Mike
Material type: Text Book
Publication details: McGraw-Hill Professional 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

137.
IIS Security by
  • Jost, Marty
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

138.
Internet Security and Firewalls by
  • Preetham, V
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

139.
Network Security A Beginner's Guide by
  • Maiwald, Eric
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

140.
Network Security Illustrated by
  • Sonnenreich, Wes, Albanese, Jason
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha