Your search returned 50 results.

Sort
Results
21.
A multidisciplinary introduction to information security by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MJO-M.

22.
Introduction to security and network forensics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.

23.
Modern cryptography, probabilistic proofs, and pseudorandomness by Series: Algorithms and combinatorics ; 17
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, c1999
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 GOL-M.

24.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

25.
Automatic malware analysis : an emulator based approach by Series: SpringerBriefs in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Springer, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.84 YIN-A.

26.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

27.
The CERT Oracle secure coding standard for Java by Series: SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LON-C.

28.
The CERT C secure coding standard by Series: The SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEA-C.

29.
Secure coding in C and C++ by Series: SEI series in software engineering
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2013
Other title:
  • Secure coding in C and C plus plus
Availability: Items available for loan: IIITD (5)Call number: 005.8 SEA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SEA-S.
  (1 votes)
30.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

31.
Software test attacks to break mobile and embedded devices by Series: Chapman & Hall/CRC innovations in software engineering and software development series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Taylor & Francis, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 HAG-S.

32.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

33.
Embedded systems security : practical methods for safe and secure software and systems development by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KLE-E.

34.
Secure programming with static analysis by Series: Addison-Wesley software security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CHE-S.

35.
Contemporary cryptography by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 OPP-C.

36.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
37.
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings by Series: Lecture notes in computer science ; 5352
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin : Springer, ©2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEK-I.

38.
Computer forensics : infoSec pro guide by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 COW-C, ...

39.
Malware, rootkits & botnets beginner's guide by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Online access:
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 ELI-M, ...

40.
Introduction to modern cryptography by Series: Chapman & hall/crc cryptography and network security series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAT-I.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in