Your search returned 769 results.

Not what you expected? Check for suggestions
BOOKS
Security Protocols, International Workshop on- Proceedings, Cambridge, UK, 1996

by Lomas, Mark. Ed.

Series: Lecture notes in computer science ; 01189Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 1997Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 18 Call number: 681 LNCS.

BOOKS
Information Security and Privacy Proceedings, Second Australian Conference, Sydney, 1997

by Varadharajan, Vijay. Ed | Pieprzyk, Josef. Ed | Mu, Yi. Ed.

Series: Lecture notes in computer science ; 01270Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 1997Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 19 Call number: 681 LNCS.

BOOKS
Computer Security - ESORICS 96 Proceedings, 4th European Symposium, Italy, 1996

by Bertino, E. Ed. Kurth, H. Ed | Martella, G. Ed | Montolivo, E. Ed.

Series: Lecture notes in computer science ; 01146Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 1996Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 18 Call number: 681 LNCS.

BOOKS
Elliptic curves in cryptography

by Blake, Ian F | Seroussi, Gadiel | Smart, Nigel.

Series: London mathematical society lecture note series ; 00265Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Cambridge ; Cambridge University Press ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): First Floor, Rack No: 28, Shelf No: 14 Call number: 511 BLA.

BOOKS
CISCO IOS Network Security : Documentation from the Cisco IOS Reference Library

by Cisco Documentation.

Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: India ; Macmillan ; 1998Availability: Items available for loan: IMSc Library (1). Location(s): Second Floor, Rack No: 50 Shelf No: 13 Call number: 681.9 CIS.

BOOKS
Computer Security

by Gollmann, Dieter.

Series: Worldwide Series in Computer ScienceMaterial type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: USA ; John Wiley ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 48 Call number: 681.3 GOL.

BOOKS
Concurrency and Parallelism, Programming, Networking, and Security : Proceedings, 2nd ASIAN 1996, Singapore

by Jaffar, Joxan. Ed | Yap, Roland H C. Ed.

Series: Lecture notes in computer science ; 01179Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 1996Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 18 Call number: 681 LNCS.

BOOKS
Maximum Linux Security : Hacker's Guide to Protecting your Linux Server and Workstation

by Anonymous.

Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: India ; Techmedia ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 50, Shelf No: 11 Call number: 681.9 ANO.

BOOKS
Internet Security : Risk Analysis, Strategies and Firewalls

by Kyas, Othmar.

Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: USA ; Thomson Comp. Press ; 1997Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 50, Shelf No: 19 Call number: 681.9 KYAS.

BOOKS
Cryptography and Network Security : Principles and Practice

by Stallings, William.

Edition: 2ndMaterial type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: New Jersey ; Prentice Hall ; 2000Availability: Items available for loan: IMSc Library (1). Checked out (1). Location(s): First Floor, Rack No: 28, Shelf No: 39 Call number: 511 STA.

BOOKS
Applied Cryptography : Protocols, Algorithms, and Source Code in C

by Schneier, Bruce.

Edition: 2ndMaterial type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: New York ; John Wiley ; 1996Availability: Items available for loan: IMSc Library (1). Location(s): First Floor Rack No:28 Shelf No:37 Call number: 511 SCH.

BOOKS
Computer Security - ESORICS 2000, Proceedings of the 6th European Symposium, France

by Cuppens, Frederic. et al Eds.

Series: Lecture notes in computer science ; 01895Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2000Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 24 Call number: 681 LNCS.

BOOKS
Information Security and Privacy, Proceedings of the First Australian Conference, Wollongong, Australia, 1996

by Pieprzyk, Josef. Ed | Seberry, Jennifer. Ed.

Series: Lecture notes in computer science ; 01172Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 1996Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 18 Call number: 681 LNCS.

BOOKS
Information Security and Cryptology - ICISC 2000, Proceedings of the Third International Conference, Korea, 2000

by Won, Dongho. Ed.

Series: Lecture notes in computer science ; 02015Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2001Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 25 Call number: 681 LNCS.

BOOKS
Security Protocols, Proceedings of the 7th International Workshop, Cambridge, 1999

by Christianson, Bruce.et al Eds.

Series: Lecture notes in computer science ; 01796Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2000Availability: Items available for loan: IMSc Library (1). Location(s): 7Second floor, Rack No: 48, Shelf No: 23 Call number: 681 LNCS.

BOOKS
Information Security and Cryptology - ICISC 1999 : Proceedings of the Second International Conference, Korea

by Song, JooSeok. Ed.

Series: Lecture notes in computer science ; 01787Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2000Availability: Items available for loan: IMSc Library (1). Location(s): 7Second floor, Rack No: 48, Shelf No: 23 Call number: 681 LNCS.

BOOKS
Information Security and Privacy, Proceedings of the 5th Australasian Conference, Brisbane, Australia, 2000

by Dawson, Ed. Ed | Clark, Andrew. Ed | Boyd, Colin. Ed.

Series: Lecture notes in computer science ; 01841Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2000Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 24 Call number: 681 LNCS.

BOOKS
Contemporary Cryptology : Science of Information Integrity

by Simmons, Gustavus J. Ed.

Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: USA ; IEEE ; 1999Availability: Items available for loan: IMSc Library (1). Location(s): First Floor, Rack No: 28, Shelf No: 39 Call number: 511 SIM.

BOOKS
Information and Communications Security, Proceedings of the 3rd International Conference, China, 2001

by Qing, Sihan. Ed | Okamoto, Tatsuaki. Ed | Zhou, Jianying. Ed.

Series: Lecture notes in computer science ; 02229Material type: Text Text;Language: ; Format: print ; Literary form: Not fiction Publication details: Berlin ; Springer ; 2001Availability: Items available for loan: IMSc Library (1). Location(s): Second floor, Rack No: 48, Shelf No: 27 Call number: 681 LNCS.

The Institute of Mathematical Sciences, Chennai, India

Powered by Koha