Your search returned 5 results.

Sort
Results
Securing the perimeter : deploying identity and access management with free open source software

by Schwartz, Michael | Machulak, Maciej.

Material type: Text Text Publication details: New york: ; Apress, ; 2018Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 SCH.

Pro ASP.NET core identity : under the hood with authentication and authorization in ASP.NET core 5 and 6 applications

by Freeman, Adam.

Material type: Text Text Publication details: New York: Apress, 2021Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 FRE.

3GE collection on engineering: smart card technology

by 3G E-Learning.

Material type: Text Text Publication details: New York : 3G Elearning, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 GEL.

Handbook of applied cryptography

by Menezes, Alfred J | Van Oorschot, Paul C | Vanstone, Scott A.

Material type: Text Text Publication details: Boca Raton : CRC Press, Taylor & Francis, 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.82 MEN.

Metasploit : the penetration tester's guide

by Kennedy, David | Kearns, Devon [Contributor] | Moore, HD [Forwarder] | O' Gorman, Jim [Contributor].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco : no starch Press, 2011Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 KEN.

Pages

© Copyright 2017 by Presidency University. All Rights Reserved.