FEEDBACK Smiley face

Your search returned 1137 results. Subscribe to this search

|
1. Security engineering : a guide to building dependable distributed systems

by Anderson, Ross.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 AND-S] (4).
Items available for reference: IIITD [REF 005.8 AND-S] (1).
  (1 votes)
2. Security and usability : designing secure systems that people can use

by Cranor, Lorrie Faith | Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastapol, CA : O'Reilly, ©2005Online access: Table of contents | Publisher description Availability:
Items available for reference: IIITD [REF 005.8 CRA-S] (1).

3. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

4. Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

5. Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

6. Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

7. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven 1975-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, c2007Online access: Table of contents only | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 JAK-P] (1).

8. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 JAK-C] (1).

9. Introduction to computer security

by Bishop, Matt (Matthew A.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Addison-Wesley, c2005Online access: Table of contents Availability:
Items available for reference: IIITD [REF 005.8 BIS-I] (1).

10. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Springer, ©2003Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 PIE-F] (1).
Items available for reference: IIITD [REF 005.8 PIE-F] (1).

11. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Redmond, Wash. : Microsoft Press, 2003Online access: Contributor biographical information | Publisher description Availability:
Items available for reference: IIITD [REF 005.803 TUL-M] (1).

12. Database security

by Castano, Silvana.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York, N.Y. : Addison-Wesley, c1995Availability:
Items available for reference: IIITD [REF 005.8 FUG-D] (1).

13. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson, ©2009Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 BRI-C] (1).

14. Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003Online access: Publisher description | Table of contents Availability: No items available
Withdrawn (1).

15. Core security patterns : best practices and strategies for J2EE, web services, and identity management

by Steel, Christopher 1968- | Nagappan, Ramesh | Lai, Ray.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: IIITD [005.8 STE-C] (1).

16. Network security essentials : applications and standards

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: No items available
Checked out (1).

17. Cryptography and network security

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi: Pearson, ©2009Availability:
Items available for reference: IIITD [REF 005.82 STA-C] (1). Checked out (2).

18. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.82 FOR-F] (1).
Items available for reference: IIITD [REF 005.82 FOR-F] (1).

19. 19 Deadly sins of software security : programming flaws and how to fix them

by Howard, Michael | David, LeBlanc | Viega, John.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Tata McGraw Hill, New Delhi : 2005Availability: Items available for loan: IIITD [005.8 HOW-D] (1).

20. Secure coding : principles and practices

by Graff, Mark G | Van Wyk, Kenneth R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : SPD, 2003Availability: Items available for loan: IIITD [005.8 GRA-S] (4).
Items available for reference: IIITD [REF 005.8 GRA-S] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in