Results
|
|
251.
|
|
Image from Amazon.com
|
Security for wireless sensor networks using Identiy-Based Cryptography by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Suite CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,42:(894) Q3.
star rating
Average : 0.0 out of 5 stars
|
|
|
252.
|
|
Image from Amazon.com
|
|
|
|
253.
|
|
Image from Amazon.com
|
Security in distributed and networking systems by Series: Computer and network security, 1
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey World Scientific 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
254.
|
|
Image from Amazon.com
|
Security in Network Coding by
Material type: Text; Format:
print
Language: English
Publication details: Springer ; Springer ; 2016
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
255.
|
|
Image from Amazon.com
|
Security in Network Functions Virtualization by
Material type: Text; Format:
print
Language: English
Publication details: Elsevier Elsevier 2018
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
256.
|
|
Image from Amazon.com
|
Security in wireless sensor network by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2016
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,42:(894) Q6.
star rating
Average : 0.0 out of 5 stars
|
|
|
257.
|
|
Image from Amazon.com
|
|
|
|
258.
|
|
Image from Amazon.com
|
|
|
|
259.
|
|
Image from Amazon.com
|
|
|
|
260.
|
|
Image from Amazon.com
|
|
|
|
261.
|
|
|
|
|
|
262.
|
|
|
Terror of Pota and other Security Legislation in india by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Human Rights Law Network India 2004
Availability: Items available for loan: Law Centre-I Library (1)Collection, call number: Z2,5 P4.
star rating
Average : 0.0 out of 5 stars
|
|
|
263.
|
|
|
Terror Of POTA and other security legislation in India by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Human Right Law Network India 2004
Availability: Items available for loan: Faculty of Law Library (1)Collection, call number: Y:45:(Z2) P4.
star rating
Average : 0.0 out of 5 stars
|
|
|
264.
|
|
|
Terror Of POTA and other security legislation in India by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Human Right Law Network India 2004
Availability: Not available: Faculty of Law Library: In transit (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
265.
|
|
|
Terror of POTA and other security legislation in India. by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Human rights Law Network 2004
Availability: Items available for loan: South Campus Library (1)Collection, call number: Y:496(Z2)'P P4.
star rating
Average : 0.0 out of 5 stars
|
|
|
266.
|
|
|
|
|
|
267.
|
|
Image from Amazon.com
|
|
|
|
268.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
269.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
270.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
271.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
272.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
273.
|
|
Image from Amazon.com
|
Virtualization Security : protecting virtualized environments by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Indiananapolis John Wiley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
274.
|
|
Image from Amazon.com
|
|
|
|
275.
|
|
Image from Amazon.com
|
|
|
|
276.
|
|
Image from Amazon.com
|
Wireless mobile internet security by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: West Sessex Wiley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
277.
|
|
Image from Amazon.com
|
Wireless networking principles: From terrestrial to underwater acoustic by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Singapore Springer 2018
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,4 Q8.
star rating
Average : 0.0 out of 5 stars
|
|
|
278.
|
|
Image from Amazon.com
|
Wireless sensor network security by Series: Cryptology and information security series, 1
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Amsterdam IOS Press 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|