Refine your search

Your search returned 109 results.

Sort
Results
61.
The art of deception : controlling the human element of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana: Wiley, ©2002
Availability: Not available: IIITD: Checked out (1).

62.
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.82 HOL-M.

63.
The myths of security : what the computer security industry doesn't want you to know by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 VIE-M.

64.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (5)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (2).

65.
Hacking the hacker : learn from the experts who take down hackers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.87 GRI-H.

66.
Practical internet of things security : a practical indispensable security guide that will navigate you through the complex realm securely building and developing systems in our IoT- connected world. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Packt, ©2016
Availability: Items available for loan: IIITD (1)Call number: 005.8 RUS-P.

67.
Securing the internet of things by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: United States : Syngress, ©2017
Availability: Items available for loan: IIITD (1)Call number: 004.678 LI-S.

68.
Computer security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.

69.
The hardware trojan war : attacks, myths, and defenses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland : Springer, ©2018
Availability: Not available: IIITD: Loan on demand (1).

70.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

71.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

72.
Network security essentials : applications and standards by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2019
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

73.
Cybersecurity : the insights you need from Harvard Business Review by Series: The insights you need from Harvard Business Review
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Harvard Business Review Press, ©2019
Other title:
  • Insights you need from Harvard Business Review
  • Cybersecurity (Harvard Business Review Press)
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-C.

74.
Social engineering : the science of human hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAD-S.

75.
This is how they tell me the world ends by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Bloomsbury, ©2021
Availability: Items available for loan: IIITD (1)Call number: 363.32 PER-T.

76.
Android hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley, ©2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 DRA-A.

77.
Computer security : art and science by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Addison-Wesley, ©2019
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-C.

78.
97 things every information security professional should know : collective wisdom from the experts by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2021
Other title:
  • Ninety-seven things every information security professional should know
Availability: Items available for loan: IIITD (1)Call number: 005.802 MOR-9.

79.
Security and microservice architecture on AWS : architecting and implementing a secured, scalable solution by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2021
Availability: Items available for loan: IIITD (1)Call number: 005.8 RAJ-S.

80.
UNIX system security : a guide for users and system administrators by Series: Addison-Wesley professional computing series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Massachusetts : Addison-Wesley, ©1992
Availability: Items available for loan: IIITD (1)Call number: 005.4 CUR-U.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in