Your search returned 106 results.

21.
Hacking: the Art of Exploitation Jon Erickson

by Erickson, Jon.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2003Availability: Items available for loan: Call number: 005.8 ERI (1).

22.
How to Cheat Securing Your Network by Ido Dubrawsky ... [et al.].

by Dubrawsky, Ido | Crayton, Chris | Cross, Mike.

Material type: Text Text Publication details: Rockland Syngress Publishing, Inc 2007Availability: Items available for loan: Call number: 005.8 DUB (1).

23.
Information Assurance: security in the information environment by Andrew Blyth

by Blyth, Andrew | Kovacich, Gerald L.

Edition: 2nd ed.Material type: Text Text Publication details: New York Springer 2006Availability: Items available for loan: Call number: 005.8 BLY (1).

24.
Information Security: a manager's guide to thwarting data thieves and hackers by Philip Alexander

by Alexander, Philip.

Material type: Text Text Publication details: London Praeger Security International 2008Availability: Items available for loan: Call number: 005.8 ALE (1).

25.
Information Security and Ethics: social and Organizational issues by Marian Quigley

by Quigley, Marian.

Material type: Text Text Publication details: London IRM Press 2005Availability: Items available for loan: Call number: 303.483 QUI (1).

26.
Information Security Architecture : an integrated approach to security in the organization by Jan Killmeyer

by Killmeyer, Jan.

Edition: 2nd ed.Material type: Text Text Publication details: London Auerbach Publications 2006Availability: Items available for reference: Not for loanCall number: REF 005.8 KIL (1). :

27.
Information Security Policies and Actions in Modern Integrated Systems by Mariagrazia Fugini

by Fugini, Mariagrazia | Bellettini, Carlo.

Material type: Text Text Publication details: London IDEA Group Publishing 2004Availability: Items available for loan: Call number: 005.8 FUG (1).

28.
Inside Java 2 Platform Security: architecture, API Design, and Implementation by Li Gong

by Gong, Li | Dageforde, Mary | Ellison, Gary.

Edition: 2nd ed.Material type: Text Text Publication details: New York Addison-Wesley 2003Availability: Items available for loan: Call number: 005.8 GON (1).

29.
Introduction to Computer Security Matt Bishop

by Bishop, Matt | Venkatramanayya, Sathyanarayana S | Sathyanarayana S. Venkatramanayya.

Material type: Text Text Publication details: New Jersey Pearson Education 2006Availability: Items available for loan: Call number: 005.8 BIS (1).

30.
Introduction to Modern Cryptography Jonathan Katz

by Katz, Jonathan | Lindell, Yehuda.

Material type: Text Text Publication details: London Chapman and Hall 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 KAT (1). :

31.
Introduction to Network Security by Douglas Jacobson

by Jacobson, Douglas.

Material type: Text Text Publication details: New York CRC Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 JAC (1). :

32.
ISA Server 2004 Thomas W. Shinder

by Shinder, Thomas W | Shinder, Debra Littlejohn.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2005Availability: Items available for loan: Call number: 005.821 SHI (1).

33.
Multimedia Encryption and Watermarking by Borko Furht

by Furht, Borko | Socek, Daniel | Muharemagic, Edin.

Material type: Text Text Publication details: New York Springer 2005Availability: Items available for reference: Not for loanCall number: REF 005.8 FUR (1). :

34.
Multimedia Security Technologies for Digital Rights Management Edited by Wenjun Zeng

by Zeng, Wenjun | Lin, Ching Yung | Yu, Heather.

Material type: Text Text Publication details: Amsterdam Elsevier 2006Availability: Items available for loan: Call number: 005.8 ZEN (1).

35.
Perfect Passwords: selection protection authentication by Mark Burnett

by Burnett, Mark | Kleiman, Dave.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 BUR (3).

36.
Practical Guide to Managing Information Security by Steve Purser

by Purser, Steve.

Material type: Text Text Publication details: Bostan Artech House 2004Availability: Items available for loan: Call number: 658.478 PUR (1).

37.
Principles of Secure Network Systems Design with a foreword by harold lawson by Sumit Ghosh

by Ghosh, Sumit.

Material type: Text Text Publication details: Berlin Springer Verlag 2002Availability: Items available for loan: Call number: 005.8 GHO (1).

38.
Recent Advances in Intrusion Detection (LNCS: 3858): 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005 by Alfonso Valdes

by Valdes, Alfonso | Zamboni, Diego.

Material type: Text Text Publication details: Netherlands Springer Verlag, Netherlands 2006Availability: Items available for reference: Not for loanCall number: REF 005 LN VAL (1). :

39.
Recent Advances in Intrusion Detection (LNCS: 4637): 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings by Christopher, Kruegel

by Kruegel, Christopher | Clark, Andrew | Lippmann, Richard.

Material type: Text Text Publication details: Netherlands Springer Verlag, Netherlands 2007Availability: Items available for reference: Not for loanCall number: REF 005 LN KRU (1). :

40.
Secure Computers and Networks: Analysis, Design, and Implementation Eric A. Fisch

by Fisch, Eric A | White, Gregory B | Gregory B. White.

Material type: Text Text Publication details: New York CRC Press 2000Availability: Items available for loan: Call number: 005.8 FIS (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha