Refine your search

Your search returned 2117 results.

Sort
Results
101.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

102.
Network security and cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Cengage Learning, ©2010
Availability: Not available: IIITD: Loan on demand (1).

103.
Towards hardware-intrinsic security : foundations and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Heidelberg ; New York : Springer, ©2010
Availability: Not available: IIITD: Loan on demand (1).

104.
Computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, ©1999
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.

105.
Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 MIT-A.

106.
Instant burp suite starter by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Packt Publishing, ©2013
Availability: Items available for loan: IIITD (1)Call number: 658.11 CAR-B.

107.
Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: UK : Packt Publishing, ©2014
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (1)Call number: 005.8 MAH-B.

108.
Public-key cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2009
Availability: Not available: IIITD: Loan on demand (1).

109.
Hardware security : design, threats, and safeguards by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Not available: IIITD: Loan on demand (1).

110.
The art of deception : controlling the human element of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana: Wiley, ©2002
Availability: Not available: IIITD: Checked out (1).

111.
SSL and TLS : designing and building secure systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 RES-S.

112.
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.82 HOL-M.

113.
Understanding the digital world : what you need to know about computers, the Internet, privacy, and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: 004 KER-U.

114.
13 hours : the inside account of what really happened in Benghazi by
Material type: Text Text; Format: print ; Nature of contents: biography; Literary form: Not fiction
Publication details: London : Ebury Press, ©2014
Other title:
  • Thirteen hours
Availability: Items available for loan: IIITD (1)Call number: 363.3250 ZUC-1.

115.
Secure java : for web application development by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (2)Call number: REF 006.76 BHA-S, ...

116.
The myths of security : what the computer security industry doesn't want you to know by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : O'Reilly, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 VIE-M.

117.
Cryptography and network security : principles and practice by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2017
Availability: Items available for loan: IIITD (6)Call number: 005.8 STA-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C. Not available: IIITD: Checked out (1).

118.
Cyber-assurance for the internet of things by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Wiley, ©2017
Availability: Not available: IIITD: Loan on demand (1).

119.
RFID in libraries: theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Manakin Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: 025.0028 DE-R.

120.
Hacking the hacker : learn from the experts who take down hackers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Wiley, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.87 GRI-H.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in