Results
|
21.
|
Exploiting software: How to break code by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 HOG/E.
|
|
22.
|
Computer security basics by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Beijing/Mumbai O'reilly/Shroff Publishers and Distributors 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 LEH/C.
|
|
23.
|
Designing security: Architecture solutions by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: U.S.A Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 RAM/D.
|
|
24.
|
|
|
25.
|
Security in wireless LANs and MANs by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston Artech House 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 HAR/S.
|
|
26.
|
|
|
27.
|
Information Security Principles and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 STA/I.
|
|
28.
|
Computer security and cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Canada Wiley 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 KON/C.
|
|
29.
|
|
|
30.
|
Information security management handbook by
Edition: 5
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton Auerbach Publications 2004
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.8 TIP/I.
|
|
31.
|
Network security: Jumpstart computer and network security basics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: San Francisco Sybex 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 STR/N.
|
|
32.
|
Computer security handbook by
Edition: 4
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Canada Wiley 2002
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.8 BOS/C .
|
|
33.
|
Defeating the hacker: A non technical guide to computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: England Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SCH/D.
|
|
34.
|
Security for ubiquitous computing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: England Wiley 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/S.
|
|
35.
|
Information security: A strategic approach by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 LEV/I.
|
|
36.
|
Secrets and lies: Digital security in a networked world by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Canada Wiley 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SCH/S.
|
|
37.
|
Halting the hacker: A practical guide to computer security by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Jersey Prentice Hall 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PIP/H.
|
|
38.
|
Know your enemy: Learning about security threats by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston Addison Wesley 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 HON/K.
|
|
39.
|
Malware fighting malicious code by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston Prentice Hall 2004
Availability: Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (1).
|
|
40.
|
Privacy: What developers and IT professionals should know by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston Addison Wesley 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAN/P.
|