Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Refine your search

Your search returned 272 results.

Sort
Results
Introducing computer security

by Wood M B.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Manchester NCC publns 1982Availability: Items available for loan: 1 Call number: 658.47 W877.
Database security and integrity

by Fernandez E B | Summers R C [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Reading Addison Wesley 1981Availability: Items available for loan: 1 Call number: 005.8 F363.
Modern cryptology

by Brassard Gilles.

Series: Lecture notes in computer science, 325Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: N Y Springer Verlag 1988Availability: Items available for loan: 1 Call number: 005.82 B823.
Protection of computer software-its technology and applications

by Grover Derrick [ed.].

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Cambridge C U P 1989Availability: Items available for loan: 1 Call number: 005.8 G883.
AS/400 security in a client/server environment

by Park J S.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: N Y John Wiley 1995Availability: Items available for loan: 2 Call number: 005.8 P235, ...
Computer system and network security

by White G B | Fisch E A [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: N Y C R C 1996Availability: Items available for loan: 1 Call number: 005.8 W584.
Protect your privacy on the Internet

by Pfaffenberger Bryan.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York John Wiley 1997Availability: Items available for loan: 2 Call number: 005.8 P523, ...
Information hiding Steganography and watermaking-attacks and countermeasures

by Johnson Neil F | Duric Zoran [Auth.] | Jajodia Sushil [Auth.].

Series: Advances in information security; 1Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boston Kluwer Academic 2001Availability: Items available for loan: 1 Call number: 005.8 J68.
Elliptic curves in cryptography

by Blake I F | Seroussi G [Auth.] | Smart N P [Auth.].

Series: London Mathematical Society lecture note series; 265Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Cambridge CUP 2000Availability: Items available for loan: 1 Call number: 005.82 B636.
Elliptic curves and their applications to cryptography an introduction

by Enge Andreas.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boston Kluwer Academic 1999Availability: Items available for loan: 1 Call number: 005.82 En57.
Information security handbook

by Hunter John M D.

Series: Computer communications and networksMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: London Springer-Verlag 2001Availability: Items available for loan: 1 Call number: 005.8 H945.
Computer forensics computer crime scene investigation

by Vacca John.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Hingham Charles River Media 2002Availability: Items available for loan: 2 Call number: 363.25968 V113, ...
Security technologies for the world wide web

by Oppliger Rolf.

Series: Artech House computing libraryMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boston Artech House 2000Availability: Items available for loan: 1 Call number: 005.8 Op62.
Implementing biometric security

by Chirillo John | Blaul Scott [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Indianapolis Wiley 2003Availability: Items available for loan: 1 Call number: 005.82 C541.
Cryptography decrypted

by Mel H X | Baker Doris [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boston Addison-Wesley 2001Availability: Items available for loan: 1 Call number: 005.82 M517.
Cryptographic security architecture design and verification

by Gutmann Peter.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York Springer-Verlag 2004Availability: Items available for loan: 1 Call number: 005.8 G984.
Network security a practical approach

by Harrington Jan L.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Amsterdam Elsevier 2005Availability: Items available for loan: 1 Call number: 005.8 H299.
Coding for data and computer communications

by Salomon David.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York Springer-Verlag 2005Availability: Items available for loan: 1 Call number: 005.8 Sa174.
Advances in elliptic curve cryptography

by Blake Ian F [ed.] | Seroussi Gadiel [ed.] | Smart Nigel P [ed.].

Series: London Mathematical Society lecture note series; 317Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Cambridge CUP 2005Availability: Items available for loan: 1 Call number: 005.8 B636.
Computer insecurity risking the system

by Furnell Steven.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: London Springer-Verlag 2005Availability: Items available for loan: 1 Call number: 005.82 F987.
Pages
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in



Hosted, Implemented & Customized by: Avior Technologies Pvt. Ltd.

Powered by Koha