Refine your search

Your search returned 387 results.

Sort
Results
1.
2.
Cyber Security 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

3.
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

4.
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

5.
6.
Computer Aided Verification 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part I by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

7.
Cryptography, network security, and cyber laws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning India Pvt. Ltd., 2018
Availability: No items available.

8.
Digital Identity: an emergent legal concept by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

9.
A practical introduction to enterprise network and security management by
Edition: 2nd ed..
Material type: Text Text; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2022
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SHI/P.

10.
GDPR and Biobanking Individual Rights, Public Interest and Research Regulation across Europe by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

11.
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields by
Material type: Text Text
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1).

12.
Cryptography and network security: Principles and practice William Stallings by
Edition: 7
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2017
Availability: Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (1).

13.
Penetration testing fundamentals: A hands-on guide to reliable security audits by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chennai, Pearson India Education Services Pvt. Ltd./ Saurabh Printers Pvt. Ltd., 2018
Availability: Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (1).

14.
15.
16.
Managing trust in cyberspace edited by Sabu M Thampi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC press, 2014
Online resources:
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 THA/M;2.

17.
Image authentication using visual cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

18.
Security protection over mozea Anjali Joy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

19.
Construction of data stealing malware in andriod Nithya Sasi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2015-17 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

20.
Fraudulent e-mail detection using bag of words and naive bayes by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

Pages