Results
|
1.
|
Applied cryptography: Protocols, algorithms, and source code in C by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.
|
|
2.
|
Practical Unix and internet security by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 1999
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAR/P.
|
|
3.
|
Firewalls :A complete guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 GON/F.
|
|
4.
|
|
|
5.
|
|
|
6.
|
Computer security art and science by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BIS/C.
|
|
7.
|
Cryptography in C and C++ by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Springer 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEL/C.
|
|
8.
|
Security in computing by
Edition: 3
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Pearson Education 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.
|
|
9.
|
Email, spam and viruses : Degunking your email, spam and viruses by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Paraglyph Press 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.84 DUN/E.
|
|
10.
|
Gray hat hacking: The ethical hacker's handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Tata McGraw Hill 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HAR/G.
|
|
11.
|
Computer security by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi Dreamtech 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOL/C.
|
|
12.
|
Apache tomcat security handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Navi Mumbai Wrox Press Ltd /Shroff Publishers and Distributors Pvt.Ltd 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 TUR/A.
|
|
13.
|
Computer security by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: England Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOL/C.
|
|
14.
|
Shellcoder's handbook: Discovering and exploiting security holes by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Canada Wiley 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 KOZ/S.
|
|
15.
|
Contemporary cryptology: The science of information integrity by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York IEEE Press 1992
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SIM/C.
|
|
16.
|
Applied cryptography protocols, algorithms and source code in C by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.
|
|
17.
|
|
|
18.
|
Black hat physical device security: Exploiting hardware and software by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai Shroff Publishers and Distributors 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 MIL/B.
|
|
19.
|
Managing security with snort and IDS tools by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai O'reilly/Shroff Publishers and Distributors 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 COX/M.
|
|
20.
|
SSH, the Secure shell: The Definitive Guide by
Edition: 2
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Mumbai O'reilly/Shroff Publishers and Distributors 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BAR/S.
|