Results
|
|
201.
|
|
|
|
|
|
202.
|
|
Image from Amazon.com
|
Fundamentals of computer security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
203.
|
|
Image from Amazon.com
|
|
|
|
204.
|
|
Image from Amazon.com
|
Fundamentals of network security by Series: Information security series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi TMH 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
205.
|
|
Image from Amazon.com
|
Fundamentals of network security by Series: Information security series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi TMH 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
206.
|
|
Image from Amazon.com
|
Fundamentals of secure system modelling by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Switzerland Springer 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
207.
|
|
Image from Amazon.com
|
|
|
|
208.
|
|
Image from Amazon.com
|
Grid computing security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
209.
|
|
Image from Amazon.com
|
Guide to computer network security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London Springer 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P9 TB.
star rating
Average : 0.0 out of 5 stars
|
|
|
210.
|
|
Image from Amazon.com
|
Guide to computer network security by
Edition: 4
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London Springer 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P9;Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
211.
|
|
Image from Amazon.com
|
Guide to elliptic curve cryptography by Series: Springer professional computing
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer-Verlag 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
212.
|
|
Image from Amazon.com
|
Guide to elliptic curve cryptography by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer-Verlag 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4;1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
213.
|
|
Image from Amazon.com
|
Guide to wireless network security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P6 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
214.
|
|
Image from Amazon.com
|
Halting the hacker by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey Prentice Hall PTR 1997
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N7.
star rating
Average : 0.0 out of 5 stars
|
|
|
215.
|
|
Image from Amazon.com
|
|
|
|
216.
|
|
Image from Amazon.com
|
Handbook of database security: applications and trends by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer-Science+Business Media 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3:(894)g P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
217.
|
|
Image from Amazon.com
|
Handbook of electronic security and digital forensics by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey World Scientific 2010
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):(894)g Q0 RR.
star rating
Average : 0.0 out of 5 stars
|
|
|
218.
|
|
Image from Amazon.com
|
|
|
|
219.
|
|
Image from Amazon.com
|
Handbook of Security and Networks by
Material type: Text; Format:
print
Language: English
Publication details: World Scientific ; WSPC ; 2011
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
220.
|
|
Image from Amazon.com
|
Handbook of security, cryptography and digital signature by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Viva Books Private Limited 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)k P6 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
221.
|
|
Image from Amazon.com
|
|
|
|
222.
|
|
Image from Amazon.com
|
|
|
|
223.
|
|
Image from Amazon.com
|
|
|
|
224.
|
|
Image from Amazon.com
|
History of cyber security attacks: 1980 to present by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
225.
|
|
|
Hybrid intrusion detection system by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
226.
|
|
Image from Amazon.com
|
|
|
|
227.
|
|
Image from Amazon.com
|
|
|
|
228.
|
|
Image from Amazon.com
|
|
|
|
229.
|
|
Image from Amazon.com
|
|
|
|
230.
|
|
Image from Amazon.com
|
Information hiding by Series: Information security and privacy series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boston Artech House 2016
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q6.
star rating
Average : 0.0 out of 5 stars
|
|
|
231.
|
|
Image from Amazon.com
|
Information security by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey John Wiley 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
232.
|
|
Image from Amazon.com
|
|
|
|
233.
|
|
Image from Amazon.com
|
Information security fundamentals by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Suite CRC Press 2014
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q4.
star rating
Average : 0.0 out of 5 stars
|
|
|
234.
|
|
Image from Amazon.com
|
Information security governance by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
235.
|
|
Image from Amazon.com
|
Information security management handbook by
Edition: 5
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2004
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):(894)g P4 RR.
star rating
Average : 0.0 out of 5 stars
|
|
|
236.
|
|
Image from Amazon.com
|
|
|
|
237.
|
|
Image from Amazon.com
|
Information security management: global challenges in the new millennium by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Hershey,USA Idea Group Publishing 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1.
star rating
Average : 0.0 out of 5 stars
|
|
|
238.
|
|
Image from Amazon.com
|
Information security management:concepts and practice by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
239.
|
|
Image from Amazon.com
|
Information security policies and actions in modern integrated systems by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Hershey Idea Group Publishing 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
240.
|
|
Image from Amazon.com
|
Information security risk analysis by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
241.
|
|
Image from Amazon.com
|
Information security risk analysis by
Edition: 3
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5;Q0 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
242.
|
|
Image from Amazon.com
|
Information security: Foundations, technologies and applications by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Stevenage Institution of Engineering and Technology 2018
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q8.
star rating
Average : 0.0 out of 5 stars
|
|
|
243.
|
|
Image from Amazon.com
|
|
|
|
244.
|
|
Image from Amazon.com
|
|
|
|
245.
|
|
|
Information systems security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Englewood Cliffs Prentice-Hall 1984
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(X:8) M4-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
246.
|
|
|
Information systems security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Englewood Cliffs Prentice-Hall 1984
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(X:8) M4-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
247.
|
|
Image from Amazon.com
|
Information warfare: Corporate attack and defence in a digital world by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Oxford Butterworth Heinemann 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B),2A P1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
248.
|
|
Image from Amazon.com
|
Inside network perimeter security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Pearson Education, Inc. 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P3-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
249.
|
|
Image from Amazon.com
|
Inside network perimeter security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Pearson Education, Inc. 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P3;1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
250.
|
|
Image from Amazon.com
|
Insider threats in cyber security by Series: Advances in information security, 49
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.
star rating
Average : 0.0 out of 5 stars
|