Results
|
1.
|
Scene of cybercrime by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.
|
|
2.
|
Microsoft encyclopedia of security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.
|
|
3.
|
|
|
4.
|
|
|
5.
|
|
|
6.
|
Introduction to security and network forensics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.
|
|
7.
|
Computer security : principles and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.
|
|
8.
|
SQL injection attacks and defense by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.
|
|
9.
|
Computer and information security handbook by
Edition: Second edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.
|
|
10.
|
|
|
11.
|
The craft of system security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
|
|
12.
|
Secure multiparty computation and secret sharing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.
|
|
13.
|
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (5)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (2).
|
|
14.
|
|
|
15.
|
|
|
16.
|
Cryptography and network security by
Edition: 4th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Chennai : McGraw Hill, ©2023
Availability: Items available for loan: IIITD (1)Call number: CBIA 005.82 KAH-C.
|