Cryptography and network security
| Main Author: | Kahate, Atul |
|---|---|
| Format: | Book |
| Published: |
New Delhi :
Tata McGraw-Hill Pub. Comp. Ltd ,
2008
|
| Edition: | 2nd ed |
| Subjects: |
Similar Items
Cryptography & network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Cryptography and network security
by: Bagad, V.S
by: Bagad, V.S
Network security : the complete reference
by: Bragg, Roberta
Published: (2005)
by: Bragg, Roberta
Published: (2005)
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)
by: Santos, Omar
Published: (2008)
Network security 1 and 2 companion guide
by: Rufi, Antoon W.
Published: (2007)
by: Rufi, Antoon W.
Published: (2007)
Build your own security lab : a field guide for network testing
by: Gregg, Micheal (Micheal C.)
Published: (2008)
by: Gregg, Micheal (Micheal C.)
Published: (2008)
Web security & commerce
by: Garfinkel, Simson
Published: (1997)
by: Garfinkel, Simson
Published: (1997)
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi
by: Nik Fauzi
Mathematical aspects of classical and quantum cryptography
by: Thomas Bier
Published: (2004)
by: Thomas Bier
Published: (2004)
Virtual private networks
by: Scott, Charlie
Published: (1998)
by: Scott, Charlie
Published: (1998)
Hacker 5 : pakar keselamatan rangkaian - norton internet security
Published: (2005)
Published: (2005)
How to cheat at managing information security
by: Osborne, Mark
Published: (2006)
by: Osborne, Mark
Published: (2006)
8 steps to better security : a simple cyber resilience guide for business
by: Crawley, Kim
Published: (2022)
by: Crawley, Kim
Published: (2022)
Nota dan latihan : Word 97
Published: (1998)
Published: (1998)
Word for Windows 95 for Dummies
by: Gookin, Dan
Published: (1995)
by: Gookin, Dan
Published: (1995)
Hacker 5 : Menyingkap Rahsia Windows
Published: (2005)
Published: (2005)
Web publishing with corel wordperfect suite 8 : the official guide
by: Hadfield, Jeff
Published: (1997)
by: Hadfield, Jeff
Published: (1997)
Fundamentals of computer security technology
by: Amoroso, Edward G.
Published: (1994)
by: Amoroso, Edward G.
Published: (1994)
IT auditing : using controls to protect information assets
by: Davis, Chris
Published: (2007)
by: Davis, Chris
Published: (2007)
E-security law & strategy
by: Zaid Hamzah
Published: (2005)
by: Zaid Hamzah
Published: (2005)
Computer networking : the complete guide
by: Murray, Benjamin
Published: (2022)
by: Murray, Benjamin
Published: (2022)
Implementing secured converged wide-area networks (ISCW 642-825) lab portfolio
by: Kotfila, David
Published: (2008)
by: Kotfila, David
Published: (2008)
Computer network technology
by: Bagad, Vilas S
Published: (2007)
by: Bagad, Vilas S
Published: (2007)
Networks and information security
by: Bagad V.S
Published: (2007)
by: Bagad V.S
Published: (2007)
Writing and producing radio dramas : communication for behaviour change, volume 1
by: Fossard, Esta de
Published: (2005)
by: Fossard, Esta de
Published: (2005)
Signs And Symbols : Their Design And Meaning
by: Frutiger,Adrian
Published: (1989)
by: Frutiger,Adrian
Published: (1989)
Panduan mudah microsoft word excel dan powerpoint
by: Abu Hassan Bin Ismail
Published: (2000)
by: Abu Hassan Bin Ismail
Published: (2000)
Penulisan dalam Bahasa Malaysia Baku
by: Sulaiman Masri
Published: (1988)
by: Sulaiman Masri
Published: (1988)
Branding governance : a participatory approach to the brand building process
by: Ind,Nicholas
by: Ind,Nicholas
Wordperfect : cara mudah
by: Copestake, Stephen
Published: (1998)
by: Copestake, Stephen
Published: (1998)
Typewriting skills : solutions book
by: Stananought, Joyce
Published: (1988)
by: Stananought, Joyce
Published: (1988)
Similar Items
-
Cryptography & network security
by: Forouzan, Behrouz A.
Published: (2008) -
Cryptography and network security
by: Bagad, V.S -
Network security : the complete reference
by: Bragg, Roberta
Published: (2005) -
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008) -
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)