Your search returned 11 results.

Sort
Results
1.
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
  (1 votes)
2.
Phishing and countermeasures : understanding the increasing problem of electronic identity theft by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, c2007
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-P.

3.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Not available: IIITD: Checked out (1).
  (1 votes)
4.
Computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, ©1999
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.

5.
Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 MIT-A.

6.
The art of deception : controlling the human element of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana: Wiley, ©2002
Availability: Not available: IIITD: Checked out (1).

7.
Hacking the hacker : learn from the experts who take down hackers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.87 GRI-H.

8.
Computer security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.

9.
Social engineering : the science of human hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAD-S.

10.
Android hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley, ©2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 DRA-A.

11.
Information security : principles and practice, an indian adaptation by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New delhi : Wiley , ©2023
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-I.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in