Refine your search

Your search returned 1889 results.

Sort
Results
1.
Digital watermarking and steganography by Series: The Morgan Kaufmann series in multimedia information and systems | The Morgan kaufmann series in computer security
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Morgan Kaufmann, ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 COX-D. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 COX-D.

2.
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors. by Series: Artech House computer security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, 2000
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KAT-I.

3.
Pervasive information security and privacy developments : trends and advancements by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Information Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 NEM-P.

4.
Multimedia forensics and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey : Information Science Reference, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LIC-M.

5.
Mobile phone security and forensics a practical approach by Series: SpringerBriefs in electrical and computer engineering
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New York : Springer, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 621.384 AND-M.

6.
Security in computing by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 PFL-S.

7.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Elsevier Digital Press, © 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 NAT-I.

8.
Anti hacker toolkit by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.

9.
Introduction to information security and cyber laws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 TRI-I.

10.
Privacy and power : a transatlantic dialogue in the shadow of the NSA-Affair by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Cambridge University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: REF 342.0412 MIL-P.

11.
Surveillance studies : a reader by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2018
Availability: Items available for loan: IIITD (1)Call number: 363.232 MON-S.

12.
Surveillance studies : an overview by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Malden : Polity Press, ©2007
Availability: Items available for loan: IIITD (1)Call number: 363.252 LYO-S.

13.
Surveillance as social sorting : privacy, risk, and digital discrimination by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Routledge, ©2003
Availability: Items available for loan: IIITD (1)Call number: 323.448 LYON-S.

14.
Internet and surveillance : the challenges of web 2.0 and social media by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Routledge, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 FUC-I.

15.
This is how they tell me the world ends by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Bloomsbury, ©2021
Availability: Items available for loan: IIITD (1)Call number: 363.32 PER-T.

16.
97 things every information security professional should know : collective wisdom from the experts by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2021
Other title:
  • Ninety-seven things every information security professional should know
Availability: Items available for loan: IIITD (1)Call number: 005.802 MOR-9.

17.
Cybersecurity by Series: The MIT Press essential knowledge series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : MIT Press, ©2021
Availability: Items available for loan: IIITD (1)Call number: 005.8 WIL-C.

18.
Privacy Enhancing Technologies [electronic resource] : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / by Series: Security and Cryptology ; 7384
Edition: 1st ed. 2012.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012 In: Springer Nature eBook
Availability: No items available.

19.
Distributed Computing and Internet Technology [electronic resource] : 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013, Proceedings / by Series: Information Systems and Applications, incl. Internet/Web, and HCI ; 7753
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

20.
Data and Applications Security and Privacy XXVII [electronic resource] : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / by Series: Information Systems and Applications, incl. Internet/Web, and HCI ; 7964
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in