Your search returned 10 results.

Sort
Results
1.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

2.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

3.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
4.
Secure coding in C and C++ by Series: SEI series in software engineering
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2013
Other title:
  • Secure coding in C and C plus plus
Availability: Items available for loan: IIITD (5)Call number: 005.8 SEA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SEA-S.
  (1 votes)
5.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (4)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N.

6.
Digital watermarking and steganography by Series: The Morgan Kaufmann series in multimedia information and systems | The Morgan kaufmann series in computer security
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Morgan Kaufmann, ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 COX-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 COX-D.

7.
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
  (1 votes)
8.
Secure coding : principles and practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : SPD, 2003
Availability: Items available for loan: IIITD (5)Call number: 005.8 GRA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 GRA-S.

9.
Introduction to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, ©2006
Online access:
Availability: Items available for loan: IIITD (8)Call number: 005.8 BIS-I, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-I.

10.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Not available: IIITD: Checked out (1).
  (1 votes)
Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in