
A Selected list of Books on A Bibliography Compiled By Resource Centre (Prepared on : 13th Dec. 2010) Resource Centre Near Indroda Circle Gandhinagar - 382 007 (Available in the Resource Centre) 1. Acquisti, Alessandro ...[et al.] (eds.) Digital privacy : theory, technologies, and practices New York. Auerbach Publications, 2007 005.8 ACQ 018761 2. Acquisti, Alessandro ...[et al.] (eds.) Digital privacy : theory, technologies, and practices New York. Auerbach Publications, 2007 005.8 ACQ 018761 3. Afyouni, Hassan A. Database security and auditing : protecting data integrity and accessibility Boston. Thomson Course Technology, 2006 005.8 AFY 016388 4. Aggarwal, Charu C. & Yu, Philip S. Privacy-preserving data mining : models and algorithms New York. Springer, 2008 005.74 AGG 021394 5. Aggelou, George Mobile ad hoc networks: from wireless LANs to 4G networks. New York. McGraw-Hill, 2005. 004.688 AGG 013373 6. Agnew, Grace., Digital rights management : a librarian's guide to technology and practice Oxford. Chandos Publishing, 2008 025.12 AGN 020194 7. Agre, Philip E. Technology and Privacy London . The MIT Press , 2001 005.8 A276T 003689 8. Agre, Philip E. , Technology and Privacy London . The MIT Press , 2001 005.8 A276T 003689 9. Al Agha, Khaldoun, ed. & Omidyar, Cambyse Guy, ed. Mobile and wireless communications networks: 5th IFIP-TC6 International Conference: proceedings. New Jersey. World Scientific, 2003. 621.3821 ALA 009057 10. Alder, Raven ... [et al.] How to cheat at configuring Open Source security tools New Delhi. Syngress, 2007 005.8 ALD 017787 11. Aleksy, Markus, Korthaus, Axel & Schader, Martin., Implementing distributed systems with Java and CORBA New York. Springer, 2005 005.44 ALE 019696 12. Allen, Julia H. CERT guide to system and network security practices Boston. Addison-Wesley, 2001 005.8 ALL 007447 13. Anderson, Ross J. Security engineering : a guide to building dependable distributed systems New York. Wiley-Dreamtech India, 2003 005.8 AND 005797 14. Anderson, Ross J. Security engineering : a guide to building dependable distributed systems New York. Wiley-Dreamtech India, 2003 005.8 AND 005797 15. Anderson, Ross J. Security engineering: a guide to building dependable distributed systems, 2nd ed. New Delhi. Wiley India, 2008 005.1 AND 021324 16. Anjum, Farooq & Mouchtaris, Petros Security for wireless ad-hoc networks Hoboken. Wiley-Interscience, 2007 005.8 ANJ 015531 17. Anonymous Maximum Security New Delhi. Techmedia, 1998 005.8 ANO 000165 18. Arnold, Michael ...[et al.] Techniques and applications of digital watermarking and content protection Boston. Artech House, 2003 005.8 ARN 007430 19. Avoine, Gildas, Junod, Pascal & Oechslin, Philippe Computer system security : basic concepts and solved exercises Boca Raton. CRC Press, 2007 005.8 AVO 019821 20. Aycock, John., Computer viruses and malware New York. Springer, 2006 005.84 AYC 014696 21. Bacon, Jean Concurrent Systems New York . Addison-Wesley , 1997 005.4475 BAC 002343 22. Bacon, Jean., Concurrent systems : an integrated approach to operating systems, distributed systems and databases, 3rd ed. Harlow. Addison-Wesley, 2003 004.35 BAC 016020 23. Ballard, Jason & Ratliff, Bud Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant New Delhi. Prentice Hall of India, 2003 005.8 BAL 021963 24. Bandyopadhyay, Somprakash, Roy, Siuli & Ueda, Tetsuro Enhancing the performance of ad hoc wireless networks with smart antennas. Boca Raton. Auerbach Publications, 2006. 621.3981 BAN 015870 25. Barbeau, Michel & Kranakis, Evangelos Principles of ad hoc networking. Chichester. John Wiley & Sons, 2007. 621.382 BAR 017488 26. Bardram, Jakob E., ed., Mihailidis, Alex, ed. & Wan, Dadong, ed. Pervasive computing in healthcare Boca Raton. CRC Press, 2007 610.28 BAR 023282 27. Baresi, Luciano, ed. & Di Nitto, Elisabetta, ed. Test and analysis of Web services Berlin. Springer, 2007 005.8 BAR 018547 28. Barile, Ian Protecting your PC Boston. Charles River Media, 2007 005.8 BAR 016578 29. Barken, Lee How secure is your wireless network? : safeguarding your Wi-Fi-LAN Upper Saddle River. Prentice Hall PTR, 2004 005.8 BAR 017628 30. Barman, Scott Writing information security policies Boston. New Riders, 2002 005.8 BAR 006865 31. Barman, Scott., Writing information security policies Boston. New Riders, 2002 005.8 BAR 006865 32. Barrett, Daniel J., Richard, Silverman E. & Byrnes, Robert G. Linux security cookbook Navi Mumbai. SPD/O'Reilly, 2003 005.8 BAR 009407 33. Barwise, Jon & Seligman, Jerry., Information flow : the logic of distributed systems Cambridge. Cambridge University Press, 1997 003.54 BAR 008614 34. Basagni, Stefano, ed., Conti, Marco, ed., Giordano, Silvia, ed. & Stojmenovic, Ivan, ed. Mobile ad hoc networking. Canada. IEEE Press, 2004. 004.68 BAS 012559 35. Becker, Eberhard, Ed., Buhse, Willms, Ed., Gunnewig, Dirk, Ed. & Rump, Niels, Ed. Digital rights management : technological, economic, legal and political aspects New York. Springer-Verlag, 2003 004 BEC 008462 36. Belapurkar, Abhijit ... [et al.] Distributed systems security : issues, processes and solutions Hoboken. Wiley, 2009 005.8 BEL 022239 37. Belapurkar, Abhijit ... [et al.] Distributed systems security : issues, processes and solutions Hoboken. Wiley, 2009 005.8 BEL 022239 38. Benantar, Messaoud, ed. Access control systems : security, identity management and trust models New York. Springer, 2006 005.8 BEN 015251 39. Benantar, Messaoud, ed. Access control systems : security, identity management and trust models New York. Springer, 2006 005.8 BEN 015251 40. Bertino, Elisa ... [et al.] Security for web services and service-oriented architectures Berlin. Springer, 2010 005.8 BER 023804 41. Bhanu, Bir & Chen, Hui., Human ear recognition by computer London. Springer, 2008, 006.4 BHA 021402 42. Bhaskar, S. M. & Ahson, S. I. Information security : a practical approach New Delhi. Narosa Publishing House, 2008 005.8 BHA 025300 43. Birman, Kenneth P. Reliable distributed systems : technologies, web services, and applications New York. Springer, 2005 004.6 BIR 013382 44. Bishop, Matt Computer security : art and science New Delhi. Pearson Education, 2003 005.8 BIS 007583 - 007585 45. Bishop, Matt Introduction to computer security Boston. Addison-Wesley, 2004 005.8 BIS 011751 46. Biskup, Joachim Security in computing systems : challenges, approaches and solutions New York. Springer, 2009 005.8 BIS 021705 47. Blakley, Bob CORBA Security England. Addison-Wesley, 1999 005.8 BLA 002740 48. Boger, Marko., Java in distributed systems : concurrency, distribution and persistence Chichester. John Wiley and Sons, 2001 005.2762 BOG 005953 49. Boyd, Colin & Mathuria, Anish., Protocols for authentication and key establishment Berlin. Springer-Verlag, 2003 005.82 BOY 007550 50. Boyd, Colin & Mathuria, Anish., Protocols for authentication and key establishment Berlin. Springer-Verlag, 2003 005.82 BOY 007182 51. Bragg, Roberta Hardening windows systems : bulletproof your systems before you are hacked New Delhi. Tata McGraw-Hill, 2004 005.8 BRA 013606 52. Bragg, Roberta, Phodes-Ousley, Mark & Strassberg, Keith Network security : the complete reference New Delhi. Tata McGraw-Hill, 2005 005.8 BRA 013605 53. Brancik, Kenneth C. Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks Boca Raton. Auerbach Publications, 2008 005.8 BRA 021726 54. Brands, Stefan A. Rethinking public key infrastructures and digital certificates: Building in privacy Cambridge. The MIT Press, 2000 005.8 BRA 007469 55. Brands, Stefan A. Rethinking public key infrastructures and digital certificates: Building in privacy Cambridge. The MIT Press, 2000 005.8 BRA 007469 56. Brands, Stefan A., Rethinking public key infrastructures and digital certificates: Building in privacy Cambridge. The MIT Press, 2001 005.8 BRA 007904 57. Branigan, Steven High-tech crimes revealed : cyberwar stories from the digital front Boston. Addison-Wesley, 2005 005.8 BRA 017430 58. Brooks, Richard R. Disruptive security technologies with mobile code and peer to peer networks Boca Raton. CRC Press, 2004 005.8 BRO 011813 59. Brown, Keith Programming Windows Security Boston . Addison-Wesley , 2000 005.8 BRO 004682 60. Bruce, Glen & Dempsey, Rob Security in distributed computing : did you lock the door? New Jersey. Pearson Education, 1997 005.8 BRU 008925 61. Bruen, Aiden A. & Forcinito, Mario A. Cryptography, information theory, and error-correction : a handbook for the twenty first century New Jersey. John Wiley and Sons, 2005 005.8 BRU 012735 62. Buchanan, William., Distributed systems and networks New Delhi. Tata McGraw-Hill, 2004 004.36 BUC 010118 63. Burton, James, Dubrawsky, Ido, Osipov, Vitaly & Baumrucker, C. Tate ... [et al] Cisco security professional's guide to secure intrusion detection systems Rockland. Syngress, 2003 005.8 BUR 009720 64. Buttyan, Levente & Hubaux, Jean-Pierre Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing Cambridge. Cambridge University Press, 2008 005.8 BUT 022428 65. Cache, Johnny & Liu, Vincent Hacking exposed wireless : wireless security secrets & solutions New Delhi. Tata McGraw-Hill, 2007 005.8 CAC 023441 66. Calabrese, Thomas Information security intelligence : cryptographic principles and applications Australia. Thomson, 2004 005.8 CAL 010569 67. Calabrese, Thomas., Information security intelligence : cryptographic principles and applications Australia. Thomson, 2004 005.8 CAL 010569 68. Caloyannides,
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages40 Page
-
File Size-