Results
|
1.
|
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
|
|
2.
|
|
|
3.
|
Scene of cybercrime by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.
|
|
4.
|
|
|
5.
|
Crimeware : understanding new attacks and defenses by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-C.
|
|
6.
|
Introduction to computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Addison-Wesley, c2005
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BIS-I.
|
|
7.
|
|
|
8.
|
Microsoft encyclopedia of security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.
|
|
9.
|
Computer forensics and cyber crime : an introduction by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, N.J. : Pearson, ©2009
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BRI-C.
|
|
10.
|
|
|
11.
|
|
|
12.
|
Network security essentials : applications and standards by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.
|
|
13.
|
Secure coding : principles and practices by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : SPD, 2003
Availability: Items available for loan: IIITD (5)Call number: 005.8 GRA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 GRA-S.
|
|
14.
|
Introduction to computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Pearson, ©2006
Availability: Items available for loan: IIITD (8)Call number: 005.8 BIS-I, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-I.
|
|
15.
|
Web hacking attack and defense by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Pearson, 2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 MCC-W.
|
|
16.
|
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 SCH-A.
|
|
17.
|
|
|
18.
|
|
|
19.
|
|
|
20.
|
|