Refine your search

Your search returned 212 results.

Sort
Results
61.
An introduction to mathemetical cryptography by Jeffrey Hoffstein, Jill Pipher, Joseph H Silverman by Series: Undergraduate texts in Mathematics
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Springer, 2008
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HOF/I.

62.
Public-key cryptography : Theory and practice by Abhijit Das, C. E. Veni Madhavan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 DAS/P.

63.
Introduction to cryptography with coding theory by Wade Trappe, Lawrence C Washington by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WAD/C.

64.
Stealing the network : the complete series collector's edition by Ryan Russell, Timothy Mullen, Johnny Long by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Elsevier, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 813.6 LON/S.

65.
Elemetary cryptanalysis: A mathematical approach by Abraham Sinkov by Series: Mathematical Association of America ; 22
Edition: 2nd edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Mathematical Association of America, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SIN/E.

66.
Computer forensics and cyber crime: An introduction by Marjie T Britz by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 363.25968 BRI/C.

67.
Computer forensics and cyber crime: An introduction by Marjie T Britz by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BRI/C;1.

68.
Introduction to computer security by Matt Bishop by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BIS/I.

69.
Introduction to cryptography with coding theory by Wade Trappe, Lawrence C Washington by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 TRA/I.

70.
Public-key cryptography: Theory and practice by Abhijit Das, C. E. Veni Madhavan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 DAS/P;1.

71.
Information systems security: Security management, metrics, frameworks and best practices by Nina Godbole by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Wiley, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOD/I.

72.
CWSP: Certified wireless security professional official study guide by David D Coleman et.al by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Wiley, 2010
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 COL/C.

73.
Principles of information systems security: text and cases by Dhillon, Gurpreet by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey, Wiley, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 DHI/P.

74.
Computer security by Dieter Gollmann by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: U.K, Wiley, 2011
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOL/C.

75.
Security of e-systems and computer networks by Mohammad S Obaidat; Noureddine A Boudriga by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: U.K, Cambridge University Press, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 OBA/S.

76.
Modern cryptography: Theory and practice by Mao Wenbo by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dorling Kindersley, 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MAO/M;2.

77.
Modern cryptography: Theory and practice by Mao Wenbo by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dorling Kindersley, 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MAO/M;3.

78.
Elements of computer security by David Salomon by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Springer, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SAL/E.

79.
Certified ethical hacker (CEH) cert guide Gregg,Michael by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dorling Kindersley, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (5)Call number: 005.82 GRE/C; 1, ... Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (2).

80.
Database security and auditing: Protecting data integrity and accessibility by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi Cengage Learning India 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 AFY/D.

Pages