Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Your search returned 3380 results. Subscribe to this search

|
1. Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems

by Meyer C H | Matyas S M [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: N Y John Wiley 1982Availability: Items available for loan: [Call number: 005.82 M612] (1).
2. Introducing computer security

by Wood M B.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Manchester NCC publns 1982Availability: Items available for loan: [Call number: 658.47 W877] (1).
3. Advances in computer security management

by Rullo T A [ed.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London Heyden 1980Availability: Items available for loan: [Call number: 005.8 Ad244C] (1).
4. Database security and integrity

by Fernandez E B | Summers R C [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Reading Addison Wesley 1981Availability: Items available for loan: [Call number: 005.8 F363] (1).
5. Social insurance and economic security

by Rejda G E.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Jersey Prentice hall 1984Availability: Items available for loan: [Call number: 368.4(73) R381] (1).
6. Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer

by Davies D W | Price W L [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Chichester John Wiley 1984Availability: Items available for loan: [Call number: 005.8 D255] (1).
7. Modern cryptology

by Brassard Gilles.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: N Y Springer Verlag 1988Availability: Items available for loan: [Call number: 005.82 B823] (1).
8. Protection of computer software-its technology and applications

by Grover Derrick [ed.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge C U P 1989Availability: Items available for loan: [Call number: 005.8 G883] (1).
9. Safe and secure computing systems

by Anderson T [ed.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London BlackWell Scientific 1989Availability: Items available for loan: [Call number: 005.8 An551] (1).
10. Cryptography and data security

by Denning D E R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Reading Addison Wesley 1982Availability: Items available for loan: [Call number: 005.82 D411] (2).
11. AS/400 security in a client/server environment

by Park J S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: N Y John Wiley 1995Availability: Items available for loan: [Call number: 005.8 P235] (2).
12. Computer system and network security

by White G B | Fisch E A [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: N Y C R C 1996Availability: Items available for loan: [Call number: 005.8 W584] (1).
13. Public-key cryptography

by Salomaa Arto.

Edition: 2nd enlargedMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin Springer-Verlag 1996Availability: Items available for loan: [Call number: 005.82 Sa169] (1).
14. Protect your privacy on the Internet

by Pfaffenberger Bryan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York John Wiley 1997Availability: Items available for loan: [Call number: 005.8 P523] (2).
15. Cryptography and network security principles and practice

by Stallings William.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: New jersey Prentice-Hall International 1999Availability: Items available for loan: [Call number: 005.8 St782] (2).
16. Multilevel secure transaction processing

by Atluri Vijay | George Binto [Auth.] | Jajodia Sushil [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Kluwer Academic 2000Availability: Items available for loan: [Call number: 005.434 At881] (1).
17. Security fundamentals for E-commerce

by Hassler Vesna.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2001Availability: Items available for loan: [Call number: 005.8 H355] (1).
18. Information hiding Steganography and watermaking-attacks and countermeasures

by Johnson Neil F | Duric Zoran [Auth.] | Jajodia Sushil [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Kluwer Academic 2001Availability: Items available for loan: [Call number: 005.8 J68] (1).
19. Elliptic curves in cryptography

by Blake I F | Seroussi G [Auth.] | Smart N P [Auth.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge CUP 2000Availability: Items available for loan: [Call number: 005.82 B636] (1).
20. Elliptic curves and their applications to cryptography an introduction

by Enge Andreas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Kluwer Academic 1999Availability: Items available for loan: [Call number: 005.82 En57] (1).
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter