Your search returned 106 results.

41.
Secure Group Communications Over Data Networks by Xukai Zou

by Zou, Xukai | Ramamurthy, Byrav.

Material type: Text Text Publication details: New York Springer 2005Availability: Items available for reference: Not for loanCall number: REF 005.8 ZOU (1). :

42.
Security and Privacy in Adhoc and Sensor Networks (LNCS) by Refik Molva

by Molva, Refik.

Material type: Text Text Publication details: Berlin Springer Verlag 2005Availability: Items available for reference: Not for loanCall number: REF 005 LN MOL (2). :

43.
Security in Distributed, Grid, Mobile and Pervasive Computing by Yang Xiao

by Xiao, Yang.

Material type: Text Text Publication details: London Auerbach Publications 2007Availability: Items available for reference: Not for loanCall number: REF 005.8 XIA (1). :

44.
Security Software Development: assessing and Managing Security Risks by Douglas A. Ashbaugh

by Ashbaugh, Douglas A.

Material type: Text Text Publication details: New York CRC Press 2008Availability: Items available for loan: Call number: 005.8 ASH (2). Items available for reference: Not for loanCall number: REF 005.8 ASH (1).

45.
Formal Logical Methods for System Security and Correctness Edited by Orna Grumberg

by Grumberg, Orna | Pfaller, Christian | Nipkow, Tobias.

Material type: Text Text Publication details: Amsterdam IOS Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 GRU (1). :

46.
Key Secure Establishment by Kim-Kwang Raymond Choo

by Choo, Kim-Kwang Raymond.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2009Availability: Items available for reference: Not for loanCall number: REF 005.82 CHO (1). :

47.
Computer Security Handbook, Vol. 1 edited by Seymour Bosworth

by Bosworth, Seymour | Whyne, Eric | Kabay, M. E.

Edition: 6th ed.Material type: Text Text Publication details: New Jersey John Wiley & Sons 2014Availability: Items available for reference: Not for loanCall number: RES 005.8 BOS (1). :

48.
Computer Security Handbook, Vol. 2 edited by Seymour Bosworth

by Bosworth, Seymour | Whyne, Eric | Kabay, M. E.

Edition: 6th ed.Material type: Text Text Publication details: New Jersey John Wiley & Sons 2014Availability: Items available for reference: Not for loanCall number: RES 005.8 BOS (1). :

49.
Introduction to Computer and Network Security: navigating shades of gray Richard R. Brooks

by Brooks, Richard R.

Material type: Text Text Publication details: Boca Raton CRC Press 2018Availability: Items available for loan: Call number: 005.8 BRO (1).

50.
Hop Integrity in the Internet by Chin-Tser Huang

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: Text Text Publication details: New York Springer 2006Availability: Items available for reference: Not for loanCall number: REF 005.8 HUA (1). :

51.
Computer Forensics: InfoSec Pro Guide David Cowen

by Cowen, David.

Material type: Text Text Publication details: New Delhi McGraw Hill Education Private Limited 2013Availability: Items available for loan: Call number: 005.8 COW (1).

52.
The Basics of Cyber Safety: computer and mobile device safety made easy John Sammons

by Sammons, John | Cross, Michael.

Material type: Text Text Publication details: London Elsevier 2017Availability: Items available for reference: Not for loanCall number: REF 005.8 SAM (1). :

53.
Surreptitious Software: obfuscation, watermarking, and tamperproofing for software protection by Christian Collberg

by Collberg, Christian | Myles, Ginger | Nagra, Jasvir.

Material type: Text Text Publication details: New Jersey Pearson Education 2010Availability: Items available for loan: Call number: 005.8 COL (1).

54.
Unofficial Guide to Ethical Hacking by Ankit Fadia

by Fadia, Ankit.

Material type: Text Text Publication details: New Delhi Macmillan India Pvt Ltd 2001Availability: Items available for loan: Call number: 005.8 FAD (1).

55.
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi

by Gupta, Brij | Yamaguchi, Shingo | Agrawal, Dharma P.

Material type: Text Text Publication details: IGI Global 2016Availability: Items available for reference: Not for loanCall number: REF 005.82 GUP (1). :

56.
Computer Security in the 21st Century by D.T. Lee

by Lee, D.T | Tygar, J.D | Shieh, S.P.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2005Availability: Items available for loan: Call number: 005.8 LEE (1). Items available for reference: Not for loanCall number: REF 005.8 LEE (1).

57.
Security in Embedded Devices by Catherine H. Gebotys

by Gebotys, Catherine H.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2010Availability: Items available for loan: Call number: 005.8 GOB (1).

58.
Privacy and Security for Cloud Computing by Siani Pearson

by Pearson, Siani | Yee, George.

Material type: Text Text Publication details: New York Springer 2013Availability: Items available for reference: Not for loanCall number: REF 006.78 PEA (1). :

59.
Principles of Information Security Michael E. Whitman

by Whitman, Michael E | Mattord, Herbert J.

Edition: 5th ed.Material type: Text Text Publication details: New Delhi Cengage Learning India Private Limited 2017Availability: Items available for loan: Call number: 005.8 WHI (3).

60.
Ethical Hacking and Penetration Testing Guide Rafay Baloch

by Baloch, Rafay.

Material type: Text Text Publication details: CRC Press 2015Availability: Items available for loan: Call number: 005.8 BAL (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha