Your search returned 11 results.

Not what you expected? Check for suggestions
1.
Next generation SSH2 implementation [electronic resource] : securing data in motion / Dale Liu, lead author and technical editor ; Max Caceres ... [et al.].

by Liu, Dale.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub., c2009Online access: ScienceDirect Availability: No items available :

2.
Cryptography and network security: principles and practices

by Stallings, William.

Edition: 3Material type: Text Text; Format: print Language: English Publisher: Singapore : Pearson education, 2003Availability: Items available for reference: Not for loanCall number: 005.8 STA/C (1). :

3.
Outsourcing information security

by Axelrod, Warren C.

Material type: Text Text; Format: print Language: English Publisher: Boston : Artech house, 2004Availability: Items available for reference: Not for loanCall number: 005.8 AXE/O (1). :

4.
Rethinking public key infrastructures and digital certificates: building in privacy

by Brands, Stefan A.

Material type: Text Text; Format: print Language: English Publisher: Cambridge : Mit press, 2001Availability: Items available for loan: Call number: 005.8 BRA/R (1).

5.
Wireless network security

by Xiao, Y., Ed.

Material type: Text Text; Format: print Language: English Publisher: New york : Springer, 2007Availability: Items available for loan: Call number: 005.8 XIA/W (1).

6.
Security in ad hoc and sensor networks

by Beyah, R.

Material type: Text Text; Format: print Language: English Publisher: Singapore : World scientific, 2010Availability: Items available for loan: Call number: 005.8 BEY/S (1).

7.
Securing information and communications systems: principles, technologies, and applications

by Furnell, Steven M.(Ed.) ...[Et Al.].

Material type: Text Text; Format: print Language: English Publisher: Boston : Artech house, 2008Availability: Items available for loan: Call number: 005.8 FUR/S (1).

8.
Disappearing cryptography: information hiding: steganography & watermaking

by Wayner, Peter.

Edition: 3rdMaterial type: Text Text; Format: print Language: English Publisher: Amsterdam : Elsevier, 2009Availability: Items available for loan: Call number: 005.82 WAY/D (1).

9.
Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: Text Text; Format: print Language: English Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Call number: 005.8 FOR/P (1).

10.
Practical internet security

by Vacca, John R.

Material type: Text Text; Format: print Language: English Publisher: New york : Springer, 2007Availability: Items available for loan: Call number: 005.8 VAC/P (1).

11.
Introduction to cryptography: principles and applications

by Delfs, Hans.

Edition: 2ndMaterial type: Text Text; Format: print Language: English Publisher: Verlag : Springer, 2007Availability: Items available for loan: Call number: 005.82 DEL/I (1).


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha