Refine your search

Your search returned 2959 results.

Sort
Results
1.
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
  (1 votes)
2.
Terrorism informatics : knowledge management and data mining for homeland security by Series: Integrated series in information systems ; v. 18
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, 2008
Availability: Not available: IIITD: Loan on demand (1).

3.
Digital watermarking and steganography by Series: The Morgan Kaufmann series in multimedia information and systems | The Morgan kaufmann series in computer security
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Morgan Kaufmann, ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 COX-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 COX-D.

4.
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors. by Series: Artech House computer security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, 2000
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KAT-I.

5.
Pervasive information security and privacy developments : trends and advancements by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Information Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 NEM-P.

6.
Multimedia forensics and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey : Information Science Reference, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LI-M.

7.
Computational number theory and modern cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 YAN-C.

8.
Computational number theory by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London.: Taylor and Francis, ©2013
Online access:
Availability: Not available: IIITD: Loan on demand (1).

9.
Secure multi-party computation by Series: Cryptology and information security series ; v. 10
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Netherlands : IOS Press, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 PRA-S.

10.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

11.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Elsevier Digital Press, © 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 NAT-I.

12.
Introduction to information security and cyber laws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 TRI-I.

13.
97 things every information security professional should know : collective wisdom from the experts by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2021
Other title:
  • Ninety-seven things every information security professional should know
Availability: Items available for loan: IIITD (1)Call number: 005.802 MOR-9.

14.
Privacy Enhancing Technologies [electronic resource] : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / by Series: Security and Cryptology ; 7384
Edition: 1st ed. 2012.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012 In: Springer Nature eBook
Availability: No items available.

15.
Distributed Computing and Internet Technology [electronic resource] : 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013, Proceedings / by Series: Information Systems and Applications, incl. Internet/Web, and HCI ; 7753
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

16.
Data and Applications Security and Privacy XXVII [electronic resource] : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / by Series: Information Systems and Applications, incl. Internet/Web, and HCI ; 7964
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

17.
Information Security and Cryptology -- ICISC 2012 [electronic resource] : 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers / by Series: Security and Cryptology ; 7839
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

18.
Transactions on Computational Science X [electronic resource] : Special Issue on Security in Computing, Part I / by Series: Transactions on Computational Science ; 6340
Edition: 1st ed. 2010.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010 In: Springer Nature eBook
Availability: No items available.

19.
20.
Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in