Results
|
81.
|
|
|
82.
|
Malware analysis and detection by
Material type: Text; Format:
print
; Literary form:
Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).
|
|
83.
|
Network hoping detector by
Material type: Text; Format:
print
; Literary form:
Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).
|
|
84.
|
Ninja A V : Software tool for malware detection by
Material type: Text; Format:
print
; Literary form:
Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).
|
|
85.
|
|
|
86.
|
Principles of information security Whitman, Michael E. by
Edition: 4
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Delhi, Cengage Learning India, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 WHI/P.
|
|
87.
|
Foundations of computer security David Salomon. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London, Springer, 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SAL/F.
|
|
88.
|
|
|
89.
|
Security and privacy in biometrics edited by Patrizio Campisi by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York, Springer, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAM/S.
|
|
90.
|
|
|
91.
|
Detection & prevention of vulnerabilities in enterprise ip networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Aumento Performers Solutions Pvt. Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (2).
|
|
92.
|
|
|
93.
|
|
|
94.
|
Computer security and cryptography Kadema Carter (Ed) by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York, Arcler Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAR/C.
|
|
95.
|
|
|
96.
|
|
|
97.
|
|
|
98.
|
|
|
99.
|
Network security Terry D. Pardoe and gordon F. Snyder by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi, Cengage Learning India, 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 PAR/N.
|
|
100.
|
|