Digital business security development : management technologies
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781605668062
- 005.8 22 KER-D
- HF5548.32 .D538 2011
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
IIITD Reference | Computer Science and Engineering | REF 005.8 KER-D (Browse shelf(Opens below)) | Available | 001212 |
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
REF 005.8 KAT-I Information hiding techniques for steganography and digital watermarking | REF 005.8 KAT-I Introduction to modern cryptography | REF 005.8 KAU-N Network security : | REF 005.8 KER-D Digital business security development : | REF 005.8 KIA-E Encryption for digital content | REF 005.8 KIM-H The hacker playbook 2 : | REF 005.8 KIM-H The hacker playbook 3 : |
"Premier reference source."--Cover.
Includes bibliographical references and index.
"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study"--Provided by publisher.
There are no comments on this title.