Your search returned 47 results.

Sort
Results
21.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

22.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

23.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

24.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

25.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

26.
Network security through data analysis : building situational awareness by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: Shroff publication ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 COL-N.

27.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
28.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

29.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

30.
Practical EJB project for beginners by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: SPD, 2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-P.

31.
Windows server 2008 PKI and certificate security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida PHI Learning ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 KOM-W.

32.
Network security and management by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Haryana : PHI Learning, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 SIN-N.

33.
Anti hacker toolkit by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.

34.
Comdex : securing IT infrastructure-a complete solution by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 AGA-C.

35.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

36.
SSL and TLS : designing and building secure systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 RES-S.

37.
Understanding the digital world : what you need to know about computers, the Internet, privacy, and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: 004 KER-U.

38.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (6)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (1).

39.
Cyber-assurance for the internet of things by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Wiley, ©2017
Availability: Not available: IIITD: Loan on demand (1).

40.
Practical internet of things security : a practical indispensable security guide that will navigate you through the complex realm securely building and developing systems in our IoT- connected world. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Packt, ©2016
Availability: Items available for loan: IIITD (1)Call number: 005.8 RUS-P.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in