|
|
|
|
|
|
|
|
|
|
|
Computer Security by Gollmann, Dieter. Series: Worldwide Series in Computer ScienceMaterial type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: USA ; John Wiley ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 48 Call number: 681.3 GOL.
|
|
|
|
Cryptography and Network Security : Principles and Practice by Stallings, William. Edition: 2ndMaterial type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey ; Prentice Hall ; 2000Availability: Items available for loan: IMSc Library (1). Checked out (1). Location(s): First Floor, Rack No: 28, Shelf No: 39 Call number: 511 STA.
|
|
|
|
Applied Cryptography : Protocols, Algorithms, and Source Code in C by Schneier, Bruce. Edition: 2ndMaterial type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: New York ; John Wiley ; 1996Availability: Items available for loan: IMSc Library (1). Location(s): First Floor Rack No:28 Shelf No:37 Call number: 511 SCH.
|
|
|
|
|
|
|
|
Contemporary Cryptology : Science of Information Integrity by Simmons, Gustavus J. Ed. Material type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: USA ; IEEE ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): First Floor, Rack No: 28, Shelf No: 39 Call number: 511 SIM.
|
|
|
|
Decrypted secrets methods and maxims of cryptology by Bauer, Friedrich Ludwig. Edition: 3rd, rev. and updated ed.Material type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: Berlin, New York : ; Springer ; c2002Availability: Items available for loan: IMSc Library (1). Location(s): First Floor, Rack No: 28, Shelf No: 13 Call number: BAU.
|
|
|
|
Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 proceedings by Tavares, Stafford | Meijer, Henk Eds. Series: Lecture notes in computer science ; 01556Material type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: Berlin ; Springer ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 22 Call number: 681 LNCS.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Guide to elliptic curve cryptography by Hankerson, Darrel R | Vanstone, Scott A | Menezes, A. J., (Alfred J.), 1965-. Material type: Text;Language: ; Format:
print
Publication details: New York ; Springer ; 2003Availability: No items available : Checked out (1).
|
|
|
|
|
|
|
|
Fundamentals of computer security by Pieprzyk, Josef, 1949-. Series: Monographs in theoretical computer scienceMaterial type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: Berlin, New York : ; Springer ; c2003Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 49, Shelf No: 14 Call number: 681.3 PIE.
|
|
|
|
|
|
|
|
Secrets and lies digital security in a networked world by Schneier, Bruce. Material type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: Indiana ; Wiley Publishing, Inc. ; 2004Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 49, Shelf No: 18 Call number: 681.3 SCH.
|
|
|
|
Data mining and machine learning in cybersecurity by Dua, Sumeet | Du, Xian. Material type: Text;Language: ; Format:
print
; Literary form:
Not fiction
Publication details: New york ; CRC press ; 2011Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 47 Call number: 681.3 DUA.
|