Refine your search

Your search returned 212 results.

Sort
Results
1.
Applied cryptography: Protocols, algorithms, and source code in C by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.

2.
Practical Unix and internet security by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 1999
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAR/P.

3.
Firewalls :A complete guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 GON/F.

4.
Linux system security: An administrator's guide to open source security tools by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Not available: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Checked out (1).

5.
Cryptography for database and internet applications: Developing secret and public key techniques with Java by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Wiley 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 GAL/C.

6.
Computer security art and science by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BIS/C.

7.
Cryptography in C and C++ by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Springer 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEL/C.

8.
Security in computing by
Edition: 3
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.

9.
Email, spam and viruses : Degunking your email, spam and viruses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Paraglyph Press 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.84 DUN/E.

10.
Gray hat hacking: The ethical hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata McGraw Hill 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HAR/G.

11.
Computer security by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Dreamtech 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOL/C.

12.
Apache tomcat security handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Navi Mumbai Wrox Press Ltd /Shroff Publishers and Distributors Pvt.Ltd 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 TUR/A.

13.
Computer security by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: England Wiley 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GOL/C.

14.
Shellcoder's handbook: Discovering and exploiting security holes by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Canada Wiley 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 KOZ/S.

15.
Contemporary cryptology: The science of information integrity by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York IEEE Press 1992
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SIM/C.

16.
Applied cryptography protocols, algorithms and source code in C by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.

17.
Securing the network from malicious code :A complete guide to defending against viruses, worms and trojans by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Wiley 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.84 SCH/S.

18.
Black hat physical device security: Exploiting hardware and software by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai Shroff Publishers and Distributors 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 MIL/B.

19.
Managing security with snort and IDS tools by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai O'reilly/Shroff Publishers and Distributors 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 COX/M.

20.
SSH, the Secure shell: The Definitive Guide by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai O'reilly/Shroff Publishers and Distributors 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BAR/S.

Pages