Your search returned 16 results.

1.
Enterprise Information: security and privacy by C Warren Axelrod

by Axelrod, C Warren | Schutzer, Daniel | Bayuk, Jennifer L.

Material type: Text Text Publication details: Bostan Artech House 2009Availability: Items available for reference: Not for loanCall number: REF 658.478 AXE (1). :

2.
Information Assurance: security in the information environment by Andrew Blyth

by Blyth, Andrew | Kovacich, Gerald L.

Edition: 2nd ed.Material type: Text Text Publication details: New York Springer 2006Availability: Items available for loan: Call number: 005.8 BLY (1).

3.
Introduction to Computer and Network Security: navigating shades of gray Richard R. Brooks

by Brooks, Richard R.

Material type: Text Text Publication details: Boca Raton CRC Press 2018Availability: Items available for loan: Call number: 005.8 BRO (1).

4.
Surreptitious Software: obfuscation, watermarking, and tamperproofing for software protection by Christian Collberg

by Collberg, Christian | Myles, Ginger | Nagra, Jasvir.

Material type: Text Text Publication details: New Jersey Pearson Education 2010Availability: Items available for loan: Call number: 005.8 COL (1).

5.
Legal Issues in Information Security by Joanna Lyn Grama

by Grama, Joanna Lyn.

Edition: 2nd ed.Material type: Text Text Publication details: U S A Jones & Bartlett Learning 2014Availability: Items available for loan: Call number: 342.730858 GRA (1).

6.
Backup & Recovery W Curtis Preston

by Preston, W Curtis.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2007Availability: Items available for loan: Call number: 005.86 PRE (5).

7.
Digital Watermarking Ingemar J. Cox

by Cox, Ingemar J | Bloom, Jeffrey A | Miller, Mathew L.

Material type: Text Text Publication details: San Francisco Morgan Kaufmann Publishers 2002Availability: Items available for reference: Not for loanCall number: REF 005.8 COX (1). :

8.
Information Assurance Architecture Keith D. Willett

by Willett, Keith D.

Material type: Text Text Publication details: London Auerbach Publications 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 WIL (1). :

9.
Multimedia Content Encryption: Techniques and Applications Shiguo Lain

by Lain, Shiguo.

Material type: Text Text Publication details: New York CRC Press 2009Availability: Items available for reference: Not for loanCall number: REF 005.82 LIA (1). :

10.
Practical Guide to Security Assessments Sudhanshu Kairab

by Kairab, Sudhanshu.

Material type: Text Text Publication details: London Auerbach Publications 2005Availability: Items available for reference: Not for loanCall number: REF 658.478 KAI (1). :

11.
Informed Watermarking Joachim Eggers

by Eggers, Joachim | Girod, Bernd.

Material type: Text Text Publication details: Boston Kluwer Academic Publishers 2002Availability: Items available for loan: Call number: 005.8 EGG (1).

12.
Expert SQL Server 2008 Encryption Michael Coles

by Coles, Michael | Landrum, Rodney.

Material type: Text Text Publication details: New York, NY Apress 2009Availability: Items available for loan: Call number: 005.7565 COL (1).

13.
Encyclopedia of Information Assurance; Vol. 2 of 4: data-information classification Rebecca Herold

by Herold, Rebecca | Rogers, Marcus K.

Edition: 1st ed.Material type: Text Text Publication details: Boca Raton Auerbach Publications 2011Availability: Items available for reference: Not for loanCall number: RES 005.803 HER (1). :

14.
Encyclopedia of Information Assurance; Vol. 3 of 4: information flow-planning Rebecca Herold

by Herold, Rebecca | Rogers, Marcus K.

Edition: 1st ed.Material type: Text Text Publication details: Boca Raton Auerbach Publications 2011Availability: Items available for reference: Not for loanCall number: RES 005.803 HER (1). :

15.
Encyclopedia of Information Assurance; Vol. 4 of 4: pod-XLM Rebecca Herold

by Herold, Rebecca | Rogers, Marcus K.

Edition: 1st ed.Material type: Text Text Publication details: Boca Raton Auerbach Publications 2011Availability: Items available for reference: Not for loanCall number: RES 005.803 HER (1). :

16.
Encyclopedia of Information Assurance; Vol. 1 of 4: access-cyber Rebecca Herold

by Herold, Rebecca | Rogers, Marcus K.

Edition: 1st ed.Material type: Text Text Publication details: Boca Raton Auerbach Publications 2011Availability: Items available for reference: Not for loanCall number: RES 005.803 HER (1). :


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha