Your search returned 65 results.

41.
Introduction to Computer Networks and Cybersecurity Chwan Hwa John Wu

by Wu, Chwan Hwa John | Irwin, David J.

Material type: Text Text Publication details: New York CRC Press 2014Availability: Items available for loan: Call number: 005.8 WUC (1).

42.
The Basics of Cyber Safety: computer and mobile device safety made easy John Sammons

by Sammons, John | Cross, Michael.

Material type: Text Text Publication details: London Elsevier 2017Availability: Items available for reference: Not for loanCall number: REF 005.8 SAM (1). :

43.
Distributed Networks: intelligence, security, and applications by Qurban A. Memon

by Memon, Qurban Ali.

Material type: Text Text Publication details: Boca Raton CRC Press 2014Availability: Items available for reference: Not for loanCall number: REF 005.8 MEM (1). :

44.
Cryptography for Security and Privacy in Cloud Computing by Stefan Rass

by Rass, Stefan | Slamanig, Daniel.

Material type: Text Text Publication details: Norwood Artech House 2014Availability: Items available for reference: Not for loanCall number: REF 006.78 RAS (1). :

45.
Embedded Java Security: security for mobile devices by Mourad Debbabi

by Debbabi, Mourad | Zhioua, Sami | Talhi, Chamseddine | Saleh, Mohamed.

Material type: Text Text Publication details: London Springer Verlag, Netherlands 2007Availability: Items available for loan: Call number: 005.8 DEB (1).

46.
Physical Security for IT by Michael Erbschloe

by Erbschloe, Michael.

Material type: Text Text Publication details: Amsterdam Elsevier Digital Press 2005Availability: Items available for loan: Call number: 004.0684 ERB (1).

47.
Computer and Information Security Handbook Edited by John R. Vacca

by Vacca, John R.

Material type: Text Text Publication details: Amsterdam Morgan Kaufmann Publishers 2009Availability: Items available for reference: Not for loanCall number: RES 005.8 VAC (1). :

48.
Unofficial Guide to Ethical Hacking by Ankit Fadia

by Fadia, Ankit.

Material type: Text Text Publication details: New Delhi Macmillan India Pvt Ltd 2001Availability: Items available for loan: Call number: 005.8 FAD (1).

49.
Handbook of Database Security: applications and trends by Michael Gertz

by Gertz, Michael | Jajodia, Sushil.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2008Availability: Items available for reference: Not for loanCall number: RES 005.8 GER (1). :

50.
Iris Biometric Model for Secured Network Access Franjieh El Khoury

by Khoury, Franjieh El.

Material type: Text Text Publication details: U S A CRC Press 2013Availability: Items available for reference: Not for loanCall number: REF 005.8 KHO (1). :

51.
Information Assurance Architecture Keith D. Willett

by Willett, Keith D.

Material type: Text Text Publication details: London Auerbach Publications 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 WIL (1). :

52.
Intrusion Detection in Distributed Systems: an Abstraction-Based Approach Peng Ning

by Ning, Peng | wang, Sean X | Jajodia, Sushil.

Material type: Text Text Publication details: London Kluwer Academic Publishers 2004Availability: Items available for reference: Not for loanCall number: REF 005.8 NIN (1). :

53.
Multimedia Communication Security: Recent Advances Shiguo Lian

by Lian, Shiguo.

Material type: Text Text Publication details: New York Nova Science Publishers, Inc 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 LIA (1). :

54.
Network Security Essentials: applications and standards William Stallings

by Stallings, William.

Material type: Text Text Publication details: New Delhi Pearson Education Asia 2005Availability: Items available for loan: Call number: 005.8 STA (8).

55.
Securing Information and Communication Systems: principles, technologies and application Edited by Steven M. Furnell

by Furnell, Steven M | Lopez, Javier | Katsikas, Sokratis.

Material type: Text Text Publication details: Bostan Artech House 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 FUR (1). :

56.
Wireless Operational Security John W. Rittinghouse

by Rittinghouse, John W | Ransome, James F.

Material type: Text Text Publication details: Amsterdam Elsevier 2004Availability: Items available for loan: Call number: 005.8 RIT (1).

57.
Secure Multi-Party Non-Repudiation Protocols and Applications Jose A. Onieva

by Onieva, Jose A | Zhou, Jianying | Lopez, Javier.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2009Availability: Items available for loan: Call number: 658.478 ONI (1).

58.
Information Security: principles and new concepts Kadema Carter

by Carter, Kadema.

Material type: Text Text Publication details: New York Arcler Press 2015Availability: Items available for reference: Not for loanCall number: REF 005.8 CAR (1). :

59.
Secure Data Management in Decentralized Systems Ting Yu

by Yu, Ting | Jajodia, Sushil.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2007Availability: Items available for loan: Call number: 005.8 YU (1).

60.
Intrusion Detection Networks: a key to collaborative security Carol Fung

by Fung, Carol | Boutaba, Raouf.

Material type: Text Text Publication details: Boca Raton CRC Press 2014Availability: Items available for loan: Call number: 005.8 FUN (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha