Results
|
|
1.
|
|
Image from Amazon.com
|
Case studies in secure computing : Achievements and trends by
Material type: Text; Format:
print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton : CRC Press, 2015
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q5.
star rating
Average : 0.0 out of 5 stars
|
|
|
2.
|
|
Image from Amazon.com
|
Data communications and networking by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi : Mcgraw Hill, 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71 P1;Q3;10.
star rating
Average : 0.0 out of 5 stars
|
|
|
3.
|
|
Image from Amazon.com
|
|
|
|
4.
|
|
Image from Amazon.com
|
|
|
|
5.
|
|
Image from Amazon.com
|
Digital watermarking and steganography: Fundamentals and techniques by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London Crc Press 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
6.
|
|
Image from Amazon.com
|
Emerging security algorithms and techniques by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2019
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(B288) Q9.
star rating
Average : 0.0 out of 5 stars
|
|
|
7.
|
|
Image from Amazon.com
|
|
|
|
8.
|
|
|
|
|
|
9.
|
|
Image from Amazon.com
|
|
|
|
10.
|
|
Image from Amazon.com
|
|
|
|
11.
|
|
Image from Amazon.com
|
|
|
|
12.
|
|
Image from Amazon.com
|
Operating systems : Integrals and design principles by
Edition: 6
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: South Asia Pearson education 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91 P9;2-;4.
star rating
Average : 0.0 out of 5 stars
|
|
|
13.
|
|
Image from Amazon.com
|
Operating systems : Integrals and design principles by
Edition: 6
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: South Asia Pearson education 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91 P9;2-;4.
star rating
Average : 0.0 out of 5 stars
|
|
|
14.
|
|
Image from Amazon.com
|
Operating systems : Integrals and design principles by
Edition: 6
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: South Asia Pearson education 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91 P9;2-;4.
star rating
Average : 0.0 out of 5 stars
|
|
|
15.
|
|
Image from Amazon.com
|
Practical Data Mining by
Material type: Text; Format:
print
; Literary form:
Not fiction
Language: English
Publication details: Boca : Raton C R C Press, 2012
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B),27 Q2 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
16.
|
|
Image from Amazon.com
|
REID security:techniques, protocols and system-on-chip design by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
17.
|
|
|
|
|
|
18.
|
|
|
Soft computing techniques for intrusion detection by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
19.
|
|
Image from Amazon.com
|
Statistical Pattern Recognition by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Language: English
Publication details: West Sessex : John Wiley, 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: B28930bD65,8(B) Q1 TB.
star rating
Average : 0.0 out of 5 stars
|
|
|
20.
|
|
|
|
|
|
21.
|
|
|
Techniques for enhancing the security of android framework by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: 2017
Availability: Items available for reference: Central Library: Not for loan (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
22.
|
|
|
Techniques for security in grid computing by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: 2015
Availability: Items available for reference: Central Library: Not for loan (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
23.
|
|
Image from Amazon.com
|
Wireless security and privacy: best practices and design techniques by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Pearson Education (Singapore) Pvt. Ltd. 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|