Refine your search

Your search returned 212 results.

Sort
Results
81.
Cyberpatterns: Unifying design patterns with security and attack patterns by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Springer 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BLA/C.

82.
Malware analysis and detection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

83.
Network hoping detector by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

84.
Ninja A V : Software tool for malware detection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

85.
Sailing safe in cyberspace: Protect your identity and data Anjali Kaushik. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, Sage Publication, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 KAU/S.

86.
Principles of information security Whitman, Michael E. by
Edition: 4
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi, Cengage Learning India, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 WHI/P.

87.
Foundations of computer security David Salomon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, Springer, 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SAL/F.

88.
Security for web services and service-oriented architectures Elisa Bertino et.al. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Springer, 2010
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BER/S.

89.
Security and privacy in biometrics edited by Patrizio Campisi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Springer, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAM/S.

90.
Study and implementation of attacker detection system by extending honeyd by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Mirox Cyber Security & Technology"
Availability: Items available for reference: IIITM-K: Not for loan (2).

91.
Detection & prevention of vulnerabilities in enterprise ip networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Aumento Performers Solutions Pvt. Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (2).

92.
Malware detection in smart phones based on graph invariants by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

93.
Terrorism in cyberspace: The next generation Gabriel Weimann by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEI/T.

94.
Computer security and cryptography Kadema Carter (Ed) by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Arcler Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAR/C.

95.
Fast software encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 revised selected papers Shiho Moriai (Ed.) by Series: Lecture notes in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Springer Verlag, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MOR/F.

96.
Embedded software development for safety-critical systems Chris Hobbs by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2016
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.18 HOB/E.

97.
Digital evidence and computer crime: Forensic science, computers and the internet. Eoghan Casey by
Edition: 3
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Reed Elsevier India, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 363.25968 CAS/D.

98.
Certified ethical hacker version 9(CEH v9): Study guide Sean - Philip Oriyano by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana, John Wiley and Sons, 2016
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ORI/C.

99.
Network security Terry D. Pardoe and gordon F. Snyder by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning India, 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 PAR/N.

100.
Black hat python: Python programming for hackers and pentesters Justin Seitz by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Franisco, No Strach Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.133P SEI/B.

Pages