Your search returned 106 results.

1.
Certification and Security in Inter-Organizational E-Services: IFIP TC-11 second International Workshop on Certification and Security in Inter-Organizational E-Services (CSES), World Computer Congress, Aug. 22-27, 2004, Toulouse, France by Enrico Nardelli

by Nardelli, Enrico | Talamo, Maurizio.

Material type: Text Text Publication details: New York Springer 2005Availability: Items available for reference: Not for loanCall number: REF 005.8 NAR (1). :

2.
Cryptography and Network Security Atul Kahate

by Kahate, Atul.

Edition: 3rd Ed.Material type: Text Text Publication details: New Delhi Tata McGraw Hill Education Private Ltd. 2016Availability: Items available for loan: Call number: 005.8 KAH (4).

3.
Blockchain For Dummies Tiana Laurence

by Laurence, Tiana.

Material type: Text Text Publication details: New Delhi Wiley 2017Availability: Items available for loan: Call number: 005.758 LAU (3).

4.
CEH v9: Certified Ethical Hacker Version 9 Study Guide Sean-Philip Oriyano

by Oriyano, Sean-Philip.

Material type: Text Text Publication details: New Delhi Wiley 2018Availability: Items available for loan: Call number: 005.8076 ORI (1).

5.
Comptia security+ study guide : exam SY0-501 Emmett Dulaney

by Dulaney, Emmett | Easttom, Chuck.

Material type: Text Text Publication details: New Delhi Wiley 2018Availability: Items available for loan: Call number: 005.8 DUL (2).

6.
Computer Security and Penetration Testing Alfred Basta

by Brown, Mary | Basta, Nadine | Basta, Alfred.

Edition: 2nd ed.Material type: Text Text Publication details: New Delhi Cengage Learning 2017Availability: Items available for loan: Call number: 005.8 BAS (1).

7.
Understanding and Applying Cryptography and Data Security Adam J. Elbirt

by Elbirt, Adam J.

Material type: Text Text Publication details: New Delhi CRC Press 2015Availability: Items available for loan: Call number: 005.8 ELB (1).

8.
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions Himanshu Sharma

by Sharma, Himanshu.

Material type: Text Text Publication details: Mumbai Packt Publishing Limited 2017Availability: Items available for loan: Call number: 005.8 SHA (1).

9.
Machine Learning and Security: Protecting Systems with Data and Algorithms Clarence Chio

by Chio, Clarence | Freeman, David.

Material type: Text Text Publication details: New Delhi O'Reilly 2018Availability: Items available for loan: Call number: 006.31 CHI (5).

10.
Bluetooth Security Christian Gehrmann

by Gehrmann, Christian | Smeets, Ben | Persson, Joakim.

Material type: Text Text Publication details: Bostan Artech House 2004Availability: Items available for loan: Call number: 005.8 GEH (1).

11.
Cisco Pix Firewalls Configure, Manage and Troubleshoot by Thorsten Behrens

by Behrens, Thorsten | Dubrawsky, Ido | Browne, Brian.

Material type: Text Text Publication details: Mumbai Shroff Publishing & Distributors Pvt Ltd 2006Availability: Items available for loan: Call number: 005.8 BEH (2).

12.
Computer Insecurity: risking the system by Steven Furnell

by Furnell, Steven.

Material type: Text Text Publication details: London Springer Verlag 2005Availability: Items available for loan: Call number: 005.8 FUR (1).

13.
Computer Intrusion Detection and Network Monitoring: a statistical viewpoint David J. Marchette

by Marchette, David J.

Material type: Text Text Publication details: Springer Verlag 2001Availability: Items available for reference: Not for loanCall number: REF 005.8 MAR (1). :

14.
Cryptographic Security Architecture : design and verification Peter Gutmann

by Gutmann, Peter.

Material type: Text Text Publication details: Berlin Springer Verlag 2004Availability: Items available for reference: Not for loanCall number: REF 005.8 GUT (1). :

15.
Current Security Management and Ethical Issues of Information Technology Edited by Rasool Azari

by Azari, Rasool.

Material type: Text Text Publication details: London IRM Press 2003Availability: Items available for loan: Call number: 005.8 AZA (1).

16.
Defense and Detection Strategies against Internet Worms by Jose Nazario

by Nazario, Jose.

Material type: Text Text Publication details: Bostan Artech House 2004Availability: Items available for reference: Not for loanCall number: REF 005.8 NAZ (1). :

17.
Developing Secure Distributed Systems with Corba Ulrich Lang

by Lang, Ulrich | Schreiner, Rudolf.

Material type: Text Text Publication details: Bostan Artech House 2002Availability: Items available for loan: Call number: 005.8 LAN (1). Items available for reference: Not for loanCall number: REF 005.8 LAN (1).

18.
Enterprise Information: security and privacy by C Warren Axelrod

by Axelrod, C Warren | Schutzer, Daniel | Bayuk, Jennifer L.

Material type: Text Text Publication details: Bostan Artech House 2009Availability: Items available for reference: Not for loanCall number: REF 658.478 AXE (1). :

19.
Firewall Architecture for the Enterprise by Norbert Pohlmann

by Pohlmann, Norbert | Crothers, Tim.

Material type: Text Text Publication details: New Delhi Firewall Media 2004Availability: Items available for loan: Call number: 005.8 POH (1).

20.
Grid Computing Security Anirban Chakrabarti

by Chakrabarti, Anirban.

Material type: Text Text Publication details: Berlin Springer Verlag 2007Availability: Items available for loan: Call number: 005.8 CHA (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha