Your search returned 106 results.

81.
Modeling and Simulation in Information Systems and Security Eric Gardner

by Gardner, Eric.

Material type: Text Text Publication details: United Kingdom Koros Press Limited 2014Availability: Items available for reference: Not for loanCall number: REF 004 GAR (1). :

82.
Secure Data Management in Decentralized Systems Ting Yu

by Yu, Ting | Jajodia, Sushil.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2007Availability: Items available for loan: Call number: 005.8 YU (1).

83.
Informed Watermarking Joachim Eggers

by Eggers, Joachim | Girod, Bernd.

Material type: Text Text Publication details: Boston Kluwer Academic Publishers 2002Availability: Items available for loan: Call number: 005.8 EGG (1).

84.
Introduction to Cryptography with Open-Source Software Alasdair McAndrew.

by McAndrew, Alasdair.

Material type: Text Text Publication details: Boca Raton, FL CRC Press 2011Availability: Items available for reference: Not for loanCall number: REF 005.82 MCA (1). :

85.
Computer Security: protecting digital resources Robert C Newman

by Newman, Robert C.

Material type: Text Text Publication details: Boston Jones and Bartlett 2009Availability: Items available for loan: Call number: 005.8 NEW (1).

86.
Internet Security: hacking, counter hacking and society Kenneth Einar Himma

by Himma, Kenneth Einar.

Material type: Text Text Publication details: Boston Jones and Bartlett 2007Availability: Items available for loan: Call number: 005.8 HIM (1).

87.
Security Policies and Implementation Issues Rob Johnson

by Johnson, Rob.

Material type: Text Text Publication details: UK Jones and Bartlett 2011Availability: Items available for loan: Call number: 005.8 JOH (1).

88.
Intrusion Detection Networks: a key to collaborative security Carol Fung

by Fung, Carol | Boutaba, Raouf.

Material type: Text Text Publication details: Boca Raton CRC Press 2014Availability: Items available for loan: Call number: 005.8 FUN (1).

89.
Data Mining and Machine Learning in Cybersecurity Sumeet Dua

by Dua, Sumeet | Du, Xian.

Material type: Text Text Publication details: Boca Raton Taylor & Francis 2011Availability: Items available for loan: Call number: 005.8 DUA (1).

90.
Data Mining Tools for Malware Detection Mehedy Masud

by Masud, Mehedy | Thuraisngham, Bhavani | Khan, Latifur.

Material type: Text Text Publication details: Boca Raton Taylor & Francis 2012Availability: Items available for loan: Call number: 005.8 MAS (1). Items available for reference: Not for loanCall number: REF 005.8 MAS (1).

91.
Applications of Data Mining in Computer Security Daniel Barbar�

by Barbar�, Daniel | Jajodia, Sushil.

Material type: Text Text Publication details: New York Kluwer Academic Publishers 2002Availability: Items available for reference: Not for loanCall number: REF 006.321 BAR (1). :

92.
Computer Security: principles and practice William Stallings

by Stallings, William | Brown, Lawrie.

Edition: 4th ed. Material type: Text Text Publication details: New York Pearson 2018Availability: Items available for loan: Call number: 005.8 STA (1).

93.
Cybersecurity Essentials Charles J. Brooks

by Brooks, Charles J | Short, Donald | Craig, Philip | Grow, Christopher.

Material type: Text Text Publication details: New Delhi SYBEX/WILEY 2018Availability: Items available for loan: Call number: 005.8 BRO (1).

94.
Advanced Networking and Security Edited by D. Alwyn

by Alwyn, D.

Material type: Text Text Publication details: New York Intelliz Pres 2017Availability: Items available for reference: Not for loanCall number: REF 005.8 ALW (1). :

95.
Information Technology Security: advice from experts Lawrence M. Oliva

by Oliva, Lawrence M.

Material type: Text Text Publication details: Hershey CyberTech Pub. 2004Availability: Items available for loan: Call number: 005.8 OLI (1).

96.
Computer Security and Cryptography Kadema Carter

by Carter, Kadema.

Material type: Text Text Publication details: New York Arcler Press 2015Availability: Items available for reference: Not for loanCall number: REF 005.8 CAR (1). :

97.
Security in Computing Systems: challenges, approaches and solutions Joachim Biskup

by Biskup, J.

Material type: Text Text Publication details: Berlin Springer Verlag, Netherlands 2009Availability: Items available for reference: Not for loanCall number: REF 005.8 BIS (1). :

98.
Security Strategies in Linux Platforms and Applications Michael Jang

by Jang, Michael | Messier, Ric.

Edition: 2nd ed.Material type: Text Text Publication details: London Jones and Bartlett 2017Availability: Items available for loan: Call number: 005.432 JAN (1).

99.
Mathematics of Epidemics on Networks: from exact to approximate models Istvan Z. Kiss

by Kiss, Istv�n Z | Simon, Peter L | Miller, Joel C.

Material type: Text Text Publication details: New York Springer 2017Availability: Items available for reference: Not for loanCall number: REF 004.6 KIS (1). :

100.
Essential cybersecurity science : build, test, and evaluate secure systems by Josiah Dykstra

by Dykstra, Josiah.

Publication details: Navi Mumbai Shroff Publishing & Distributors Pvt Ltd 2018Availability: Items available for loan: Call number: 005.8 DYK (2).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha