Your search returned 33 results.

1.
Foundations of computer security /

by Salomon,, David.

Edition: 1st ed.Material type: Text Text; Format: print Language: English Publication details: New Delhi: Springer, 2006Availability: Items available for loan: Call number: 005.8 SAL? (1).

2.
Fundamentals of computer security /

by Pieprzyk,, Josef.

Material type: Text Text; Format: print Publication details: New Delhi: Springer, 2009Availability: Items available for loan: Call number: 005.8 PIE/ (1).

3.
Handbook of electronic security and digital forensics /

by Jahankhani, Hamid.

Material type: Text Text Publication details: Singapore: World Scientific, 2010Availability: Items available for loan: Call number: 658.478 HAN (1).

4.
Data mining and machine learning in cybersecurity /

by Dua, Sumeet | Du, Xian.

Material type: Text Text Publication details: Boca Raton : CRC Press, c2011Availability: Items available for loan: Call number: 005.8 DUA/D (1).

5.
Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Material type: Text Text Publication details: Boca Raton : Chapman & Hall/CRC, c2008Availability: Items available for loan: Call number: 005.8 KAT/I (1).

6.
Computer security : principles and practice

by Stallings, William | Brown, Lawrie.

Material type: Text Text Publication details: New Delhi Pearson 2010Availability: Items available for loan: Call number: 005.8 STA/C (1).

7.
Computer security fundamentals

by Easttom, Chuck.

Material type: Text Text Publication details: New Delhi Pearson 2011Availability: No items available :

8.
Computer security fundamentals

by Easttom, Chuck.

Material type: Text Text Publication details: New Delhi Pearson 2011Availability: Items available for loan: Call number: 005.8 EAS/C (1).

9.
Ad Hoc and sensor networks

by Cordeiro,Carlos de Morais | Agrawal,Dharma Prakash.

Edition: 2nd.Material type: Text Text Publication details: New Jersey World Scientific 2013Availability: No items available :

10.
Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W.

Material type: Text Text Publication details: Oxford OUP 2014Availability: Items available for loan: Call number: 005.8 SIN/C (1).

11.
Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4thMaterial type: Text Text Publication details: Noida Pearson 2014Availability: Items available for loan: Call number: 005.8 PFL/S (1).

12.
Professional Java security /

by Garms, Jess | Somerfield, Daniel.

Material type: Text Text Publication details: Birmingham, UK ; Chicago, IL : Wrox Press, c2001Availability: No items available :

13.
Cryptography and network security/

by Stallings, William.

Edition: 3rd ed.Material type: Text Text Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: No items available :

14.
Applied cryptography /

by Schneier, Bruce.

Material type: Text Text Publication details: New York : Wiley, c1994Online access: Not Available | Not Available | Not Available Availability: No items available :

15.
Applied cryptography :

by Schneier, Bruce.

Edition: 2nd ed.Material type: Text Text Publication details: New York : Wiley, c1996Online access: Not Available | Not Available | Not Available Availability: No items available :

16.
Practical UNIX and Internet security /

by Garfinkel, Simson | Spafford, Gene | Garfinkel, Simson.

Series: Edition: 2nd ed.;Material type: Text Text Publication details: Beijing : O'Reilly & Associates, c1996Online access: Not Available | Not Available Availability: No items available :

17.
Cryptography and network security/

by Stallings, William.

Edition: 4th ed.Material type: Text Text Publication details: New Delhi : Pearson, c2006Online access: Not Available Availability: No items available :

18.
Linux firewalls/

by Suehring, Steve | Ziegler, Robert L | Ziegler, Robert L.

Edition: 3rd ed. /Material type: Text Text Publication details: Delhi : Pearson, 2006Online access: Not Available Availability: No items available :

19.
Cloud security/

by Krutz, Ronald L | Vines, Russell Dean.

Material type: Text Text Publication details: New Delhi : Wiley India Pub., c2010Availability: No items available :

20.
Computer security fundamentals /

by Easttom, Chuck.

Edition: 2nd ed.Material type: Text Text Publication details: Noida : Pearson, c2015Availability: No items available :

21.
Computer fundamentals/

by Anita Goel.

Material type: Text Text Publication details: Delhi: Pearson, 2010Availability: No items available :

22.
Machine learning and security: protecting systems with data and algorithms

by Chio, Clarence | Freeman, David.

Material type: Text Text Publication details: Mumbai Shrow publishers 2018Availability: Items available for loan: Call number: 006.31 CHI/M (1).

23.
Linux essentials for cybersecurity

by Rothwell, William | Kinsey,Denise.

Material type: Text Text Publication details: London Pearson 2019Availability: Items available for loan: Call number: 005.8 ROT/L (1).

24.
Network security :private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2Material type: Text Text Publication details: Noida Pearson 2017Availability: Items available for loan: Call number: 005.8 KAU/N (1).

25.
Software testing : principles and practice

by Srinivasan Desikan | Gopalaswamy Ramesh.

Material type: Text Text Publication details: Chennai Pearson 2016Availability: Items available for loan: Call number: 005.14 SRI/S (1).

26.
Cryptography and network security : principles and practice

by Stallings,William.

Edition: 7Material type: Text Text Publication details: Noida Pearson 2020Availability: Items available for loan: Call number: 005.8 STA/C (1).

27.
Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2Material type: Text Text Publication details: New Delhi Wiley India 2018Availability: Items available for loan: Call number: 005.82 SCH/A (1).

28.
Introduction to computer security

by Bishop,Matt | Sathyanarayana S Venkatramanayya.

Material type: Text Text Publication details: Noida Pearson 2013Availability: Items available for loan: Call number: 005.8 BIS/I (1).

29.
Cybersecurity readiness : a holistic and high-perfomance approach

by Dave Chatterjee.

Material type: Text Text Publication details: London Sage 2021Availability: Items available for loan: Call number: 005.8 DEV/C (1).

30.
Cloud computing security : foundations and challenges

by Vacca, John R, Ed.

Edition: 2nd edition.Material type: Text Text Availability: Items available for loan: Call number: 005.8 CLO (1).

31.
Analyzing computer security : a threat/vulnerability/countermeasure approach

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Material type: Text Text Publication details: Noida Pearson 2014Availability: Items available for loan: Call number: 005.8 PFL/A (1).

32.
Security in computing

by Pfleeger, Charles P | Pfleeger, Shari Lawrence | Margulies, Jonathan.

Edition: 5Material type: Text Text Publication details: Noida Pearson 2018Availability: Items available for loan: Call number: 005.8 PFL/S (1).

33.
Network security essentials : applications and standards

by Stallings, William.

Edition: 6th ed.Material type: Text Text Publication details: Noida Pearson 2018Availability: Items available for loan: Call number: 005.8 STA/N (1).

Powered by Koha