Refine your search

Your search returned 1489 results.

Sort
Results
1.
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
  (1 votes)
2.
Security and usability : designing secure systems that people can use by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Sebastapol, CA : O'Reilly, ©2005
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

3.
Scene of cybercrime by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.

4.
Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

5.
Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

6.
Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

7.
Phishing and countermeasures : understanding the increasing problem of electronic identity theft by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, c2007
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-P.

8.
Crimeware : understanding new attacks and defenses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-C.

9.
Introduction to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2005
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BIS-I.

10.
Fundamentals of computer security by Series: Monographs in theoretical computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2003
Availability: Items available for loan: IIITD (2)Call number: 005.8 PIE-F, ...

11.
Microsoft encyclopedia of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.

12.
Database security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: Italian
Publication details: New York, N.Y. : Addison-Wesley, c1995
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FUG-D.

13.
Computer forensics and cyber crime : an introduction by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BRI-C.

14.
Investigative data mining for security and criminal detection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003
Availability: Not available: IIITD: Withdrawn (1).

15.
Core security patterns : best practices and strategies for J2EE, web services, and identity management by Series: Prentice Hall PTR core series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2006
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 STE-C.

16.
Network security essentials : applications and standards by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

17.
Cryptography and network security by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Pearson, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.82 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 STA-C. Not available: IIITD: Checked out (1).

18.
Cryptography and network security by Series: McGraw-Hill Forouzan networking series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2008
Availability: Items available for loan: IIITD (2)Call number: 005.82 FOR-F, ...

19.
19 Deadly sins of software security : programming flaws and how to fix them by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tata McGraw Hill, New Delhi : 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 HOW-D.

20.
Secure coding : principles and practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : SPD, 2003
Availability: Items available for loan: IIITD (5)Call number: 005.8 GRA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 GRA-S.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in

Powered by Koha