Results
|
21.
|
|
Security in on-line systems by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Oxford: The National Computing Centre Ltd, 1979
Availability: Items available for loan: National Science Library (1)Call number: D 681.3.01.004.4 L9.
|
|
22.
|
|
|
|
23.
|
|
|
|
24.
|
|
|
|
25.
|
|
PC security guide 1990/1991 by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Oxford: Elsevier Advanced Technology, 1990
Availability: Items available for loan: National Science Library (1)Call number: D 681.3.01].004.4 N0.
|
|
26.
|
|
Computer data security by Series: Computer science series
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York: Van Nostrand Reinhold Company, 1973
Availability: Items available for loan: National Science Library (1)Call number: D 681.3:65.01 L3.
|
|
27.
|
|
Handbook of information security management by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston: Auerbach, 1998
Availability: Items available for loan: National Science Library (1)Call number: D 681.3.004.4 N8.
|
|
28.
|
|
|
|
29.
|
|
|
|
30.
|
|
Information security handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London: Springer-Verlag, 2001
Availability: Items available for loan: National Science Library (1)Call number: D 681.3.004.4 P1.
|
|
31.
|
|
Operating systems: by Series: Computer science series
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York: Van Nostrand Reinhold Company, 1973
Availability: Items available for loan: National Science Library (1)Call number: D 681.3.004.2 L3.
|
|
32.
|
|
Security procedures for computer systems by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Illinois: Dow Jones- Irwin, Inc., 1973
Availability: Items available for loan: National Science Library (1)Call number: D 681.3-75 L3.
|
|
33.
|
|
|
|
34.
|
|
Network security: A practical approach by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Amsterdam: Elsevier, 2005
Availability: Items available for loan: National Science Library (1)Call number: D 681.324.004.4 P5.
|
|
35.
|
|
Enterprise security with EJB and CORBA by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York: John Wiley & Sons, Inc., 2001
Availability: Items available for reference: National Science Library: Not for loan (1)Call number: 658.8 P1.
|
|
36.
|
|
|
|
37.
|
|
|
|
38.
|
|
Cryptography and network security: Principles and practice by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey: Prentice Hall, 2000
Availability: Items available for loan: National Science Library (2)Call number: D 681324.004.4 P0, ...
|
|
39.
|
|
Network security: How to plan for it and achieve it by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York: Mcgraw-Hill, Inc., 1995
Availability: Items available for loan: National Science Library (1)Call number: D 681.324.004.4 N5.
|
|
40.
|
|
LAN security handbook
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: BPB Publications, 1995
Availability: Items available for loan: National Science Library (1)Call number: D 681.324.004.4 N5.
|