Refine your search

Your search returned 114 results.

Sort
Results
1.
Network security bible by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Wiley India, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (2)Call number: 005.8 COL/N, ...

2.
Cyber security in e-governance:Critical gaps and solutions by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: PGDeG 2009-2010 INT CERT-Kerala
Availability: Items available for reference: IIITM-K: Not for loan (3).

3.
Computer security: Principles and practice by William Stallings, Lawrie Brown by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2008
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/C.

4.
Introduction to computer networks and cyber security by Chwan-Hwa Wu; David Irwin by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (3)Call number: 005.82 WU/I, ...

5.
Cyber conflict: Competing national perspectives edited by Daniel Ventre by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey, Wiley, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 VEN/C.

6.
Comdex: Securing IT infrastructure- a complete solution by Namrata Agrawal by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dreamtech, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 AGR/C.

7.
Certified ethical hacker (CEH) cert guide Gregg,Michael by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dorling Kindersley, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (5)Call number: 005.82 GRE/C; 1, ... Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (2).

8.
Guide to computer forensics and investigations by
Edition: 4
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning India, 2010
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (6)Call number: 363.25968 NEL/G, ...

9.
Cyberpatterns: Unifying design patterns with security and attack patterns by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Springer 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BLA/C.

10.
Sailing safe in cyberspace: Protect your identity and data Anjali Kaushik. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, Sage Publication, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 KAU/S.

11.
Artificial intelligence and network security: Selected papers of bilingual international conference on information technology: yesterday, today, and tomorrow 19-21 February 2015 by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, DESIDOC, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BHU/A.

12.
Terrorism in cyberspace: The next generation Gabriel Weimann by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEI/T.

13.
Cyber security and cyber war: What everyone needs to know P. W. Singer and Allan Friedman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida, Oxford University Press, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (3)Call number: 005.82 SIN/C, ...

14.
Certified ethical hacker version 9(CEH v9): Study guide Sean - Philip Oriyano by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana, John Wiley and Sons, 2016
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ORI/C.

15.
Cybrng - The anti cyber crime wing: An android web application for online crime reporting Bini B K by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

16.
Handbook of cyber crimes by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dominant, 2014
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.82 DAY/H.

17.
Advanced computer network and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dominant, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAU/A.

18.
Information warfare and cyber security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Jaipur, Book Enclave, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ARO/I.

19.
Security in computing by
Edition: 5
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson Education, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.

20.
Certified ethical hacker version 9(CEH v9): Study guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana, John Wiley and Sons, 2016
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ORI/C;1.

Pages