1.
E-Mail hacking Learn e-mail hacking the easy way / by Ankit Fadia
by Fadia, Ankit.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Vikas publishing house ptv ltd 2014Availability: Items available for loan: [Call number: 005.8 FAD] (1).
2.
How to unblock everything on the internet / by Ankit Fadia
by Fadia, Ankit.
Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Vikas publishing house ptv ltd 2014Availability: Items available for loan: [Call number: 004.65 FAD] (1).
3.
Computer security Principles and Practices / by William Stallings
by Stallings, William | Brown, Lawrie.
Edition: 3rdMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Pearson 2015Availability: Items available for loan: [Call number: 005.8 STA] (2).
4.
Cryptography and network security Principles and Practices / by William Stallings
by Stallings, William.
Edition: 6thMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida Pearson Education 2015Availability: Items available for loan: [Call number: 005.8 STA] (7).
5.
Cryptography an introduction / by Nigel P Smart
by Smart, Nigel P.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London McGraw-Hill 2003Availability: Items available for loan: [Call number: 005.82 SMA] (1).
6.
Introduction to modern cryptography / by Jonathan Katz
by Katz, Jonathan | Lindell, Yehuda.
Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton CRC Press 2015Availability: Items available for loan: [Call number: 005.82 KAT] (2).
7.
Principles of information security / by Michael E Whitman
by Whitman, Michael E | Mattord, Herbert J.
Edition: 4thMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Cengage Learning 2012Availability: Items available for loan: [Call number: 005.8 WHI] (1).
8.
Computer security / by Dieter Gollmann
by Gollmann, Dieter.
Edition: 3rdMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Wiley India 2011Availability: Items available for loan: [Call number: 005.8 GOL] (1).
9.
Decrypted secrets Methods and maxims of cryptology / by Friedrich L. Bauer
by Bauer, Friedrich L.
Edition: 3rdMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York Springer 2007Availability: Items available for loan: [Call number: 005.82 BAU] (1).
10.
Microsoft encyclopedia of security / by Mitch Tulloch
by Tulloch, Mitch.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington Microsoft Press 2003Availability: Items available for loan: [Call number: 005.803 TUL] (1).
11.
Basics of hacking and penetration testing Ethical hacking and penetration testing made easy / By Patrick Engebretson
by Engebretson, Patrick | Kennedy, David.
Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A Syngress 2011Availability: Items available for loan: [Call number: 005.8 ENG] (1).
12.
OS X exploits and defense / By Kevin Finisterre
by Finisterre, Kevin | H, Larry | Harley, David | Baccas, Paul.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A Syngress 2008Availability: Items available for loan: [Call number: 005.8 FIN] (1).
13.
Cryptography engineering Design principles and practical applications / by Niels Ferguson
by Ferguson, Niels | Schneier, Bruce | Kohno, Tadayoshi.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana Wiley Publishing, Inc. 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
14.
Security Engineering A Guide to Building Dependable Distributed Systems by / Anderson, Ross
by Anderson, Ross.
Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Wiley 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
15.
Web application hacker's handbook : finding and exploiting security flaws Finding and Exploiting Security Flaws by / Stuttard, Dafdd
by Stuttard, Dafdd | Pinto, Marcus.
Edition: Stuttard, DafddMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Wiley 2011Availability: Items available for loan: [Call number: 23 STU] (1).
16.
Cryptography And Network Security by / Forouzan, Behrouz A
by Forouzan, Behrouz A | Mukhopadhyay, Debdeep.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi McGraw Hill Education (India) pvt. Ltd. 2016Availability: Items available for loan: [Call number: 005.8 STA] (1).
17.
Securing the Cloud Cloud Computer Security Techniques and Tactics by / Winkler, Vic (J.R)
by Winkler, Vic (J.R) | Winkler, Vic (J.R).
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Elsevier 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).