|
|
|
|
|
|
|
|
Sip security by Sisalem, Dorgham | Floroiu, John jt.au. Material type: Text Publication details: Chichester John Wiley and Sons 2009Availability: Items available for loan: 1 Call number: 005.8 S48S.
|
|
|
SSL and TLS Theory and practice by Rolf, Oppliger. Edition: 3rdMaterial type: Text Publication details: Boston Artech House 2009, 2023Availability: Items available for loan: 2 Call number: 005.8 O53S, ...
|
|
|
|
|
|
Strategic information security by Wylder, John. Material type: Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for loan: 1 Call number: 005.8 W96S.
|
|
|
|
|
|
Managing cyber threats by Kumar, Vipin Ed. Material type: Text Publication details: New York Springer Science 2005Availability: Items available for loan: 1 Call number: 005.8 K98M.
|
|
|
|
|
|
Protocols for secure electronic commerce by Sherif, Mostafa Hashem. Material type: Text Publication details: Boca Raton CRC Press 2003Availability: Items available for loan: 1 Call number: 658.872028558 S39P.
|
|
|
|
|
|
Know your enemy Material type: Text Publication details: Boston Addison-Wesley 2004Availability: Items available for loan: 1 Call number: 005.8 K86.
|
|
|
|
|
|
Cisco security by Bhatnagar, Kartik. Material type: Text Publication details: Ohio Premier Press 2002Availability: Items available for loan: 1 Call number: 005.8 B51C.
|
|
|
Security for mobile networks and platforms by Assi, Selim | Dabbous, Nora jt.au. Material type: Text Publication details: Boston Artech House 2006Availability: Items available for loan: 1 Call number: 005.8 A27S.
|
|
|
Network security by Harrington, Jan L. Material type: Text Publication details: Noida Elsevier 2005Availability: Items available for loan: 1 Call number: 005.8 H32 N.
|
|
|
|
|
|
|
|
|
|
|
|
|