Your search returned 28 results.

Sort
Results
1.
Scene of cybercrime by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.

2.
Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

3.
Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

4.
Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

5.
Microsoft encyclopedia of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.

6.
Cryptography and network security by Series: McGraw-Hill Forouzan networking series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2008
Availability: Items available for loan: IIITD (2)Call number: 005.82 FOR-F, ...

7.
Digital business security development : management technologies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Business Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KER-D.

8.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (4)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N.

9.
Cryptography and network security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (2)Call number: 005.8 FOR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C.

10.
A multidisciplinary introduction to information security by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MJO-M.

11.
Introduction to security and network forensics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.

12.
Wireless networks : multiuser detection in cross-layer design by Series: Information technology--transmission, processing, and storage
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Springer, ©2005
Availability: Items available for loan: IIITD (4)Call number: 621.382 DET-W, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 621.382 DET-W.

13.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

14.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

15.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

16.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

17.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

18.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

19.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
20.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in