FEEDBACK Smiley face

Your search returned 8 results. Subscribe to this search

|
1. Security engineering : a guide to building dependable distributed systems

by Anderson, Ross.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 AND-S] (4).
Items available for reference: IIITD [REF 005.8 AND-S] (1).
  (1 votes)
2. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven 1975-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, c2007Online access: Table of contents only | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 JAK-P] (1).

3. Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, ©2001Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [005.82 SCH-A] (5).
Items available for reference: IIITD [REF 005.82 SCH-A] (1).
  (1 votes)
4. Computer security

by Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Chichester : Wiley, ©1999Availability: Items available for loan: IIITD [005.8 GOL-C] (1).

5. Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers

by Mitnick, Kevin D | Simon, William L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, IN : Wiley, ©2006Availability: No items available
Checked out (1).

6. The art of deception : controlling the human element of security

by Mitnick, Kevin D | Simon, William L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, Indiana: Wiley, ©2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: No items available
Checked out (1).

7. Hacking the hacker : learn from the experts who take down hackers

by Grimes, Roger A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, ©2017Availability: No items available
Checked out (1).

8. Computer security

by Gollmann, Dieter.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Chichester : Wiley, ©2006Availability: Items available for loan: IIITD [005.8 GOL-C] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in