Refine your search

Your search returned 1488 results.

Sort
Results
61.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

62.
Computational number theory by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London.: Taylor and Francis, ©2013
Online access:
Availability: Not available: IIITD: Loan on demand (1).

63.
The CERT Oracle secure coding standard for Java by Series: SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LON-C.

64.
The CERT C secure coding standard by Series: The SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEA-C.

65.
Secure coding in C and C++ by Series: SEI series in software engineering
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2013
Other title:
  • Secure coding in C and C plus plus
Availability: Items available for loan: IIITD (5)Call number: 005.8 SEA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SEA-S.
  (1 votes)
66.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

67.
Power analysis attacks : revealing the secrets of smart cards by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, c2007
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MAN-P.

68.
Android security cookbook by
Material type: Text Text; Format: electronic available online remote
Publication details: New Delhi : SPD, ©2013
Availability: Items available for loan: IIITD (1)Call number: 005.258 MAK-A.

69.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

70.
Software test attacks to break mobile and embedded devices by Series: Chapman & Hall/CRC innovations in software engineering and software development series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Taylor & Francis, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 HAG-S.

71.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

72.
Embedded systems security : practical methods for safe and secure software and systems development by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KLE-E.

73.
Secure programming with static analysis by Series: Addison-Wesley software security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CHE-S.

74.
Digital fortress by
Material type: Text Text; Literary form: Novels
Publication details: London : Corgi Books, ©2004
Availability: Items available for loan: IIITD (1)Call number: F BRO-D. Not available: IIITD: Checked out (1).

75.
Network security through data analysis : building situational awareness by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: Shroff publication ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 COL-N.

76.
The art of memory forensics : detecting malware and threats in windows, linux, and mac memory by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: canada , John Wiley & Sons : ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 LIG-A.

77.
Computer security handbook, vol I by
Edition: Sixth edition.Vol.I
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.

78.
Computer security handbook, vol II by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.

79.
Violent python : a cookbook for hackers, forensic analysts, penetration testers, and security engineers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Syngress Media, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.133 OCO-V.
  (1 votes)
80.
Contemporary cryptography by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 OPP-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in

Powered by Koha