Your search returned 3 results.

Sort
Results
Network security bible

by Cole, Eric | Krutz, Ronald L | Conley, James W.

Material type: Text Text Publication details: Indianapolis, IN : Wiley Pub., c2005Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 1 Call number: 005.82 COL.

Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd Edition.Material type: Text Text Publication details: New Delhi : John Wiley & Sons, Inc., 2002Availability: Items available for loan: 1 Call number: 005.82 SCH.

Professional Windows desktop and server hardening

by Grimes, Roger A.

Material type: Text Text Publication details: Indianapolis, IN : Wiley, c2006Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 2 Call number: 005.82 GRI, ...

Pages

© University of Vavuniya

---